Bugs fixes in "curl"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-9681 | When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than oth | 2024-11-18 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-8096 | When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is v | 2024-09-16 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-7264 | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect fiel | 2024-08-05 |
CVE | CVE-2024-2398 | HTTP/2 push headers memory-leak | 2024-04-29 |
CVE | CVE-2024-2004 | Usage of disabled protocol | 2024-04-29 |
About
-
Send Feedback to @ubuntu_updates