Known vulnerabilities in Canonical Ltd. contextlib2 (Ubuntu package) 0.4.0-3

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Canonical Ltd. › contextlib2 (Ubuntu package) › 0.4.0-3

Known vulnerabilities in Canonical Ltd. contextlib2 (Ubuntu package) 0.4.0-3

Vendor: Canonical Ltd.
Website: https://www.ubuntu.com/
Total Security Bulletins: 26
21.6.0-1 0.6.0.post1-3 0.6.0.post1-2 0.6.0.post1-1 0.6.0-4 0.6.0 0.5.5 0.5.1 0.4.0 0.6.0-3 0.6.0-1 0.6.0-2 0.5.5-3build1 0.5.5-2 0.5.5-3 0.5.5-1 0.5.4-1 0.5.3-1 0.5.1-1 0.4.0-3 0.4.0-1 0.4.0-2 0.4.0-2.1

Security bulletins (26)

Secuity bulletin Severity Status Published
SB2020121111: Integer overflow in squid (Alpine package) High
Patched
11.12.2020
SB2020121112: Out-of-bounds write in squid (Alpine package) High
Patched
11.12.2020
SB2020121113: Out-of-bounds write in squid (Alpine package) Medium
Patched
11.12.2020
SB2020102216: Resource exhaustion in squid (Alpine package) Low
Patched
22.10.2020
SB2020102215: HTTP response splitting in squid (Alpine package) Medium
Patched
22.10.2020
SB2020102214: Inconsistent interpretation of HTTP requests in squid (Alpine package) Medium
Patched
22.10.2020
SB2020022445: Buffer overflow in squid (Alpine package) Medium
Patched
24.02.2020
SB2019111122: Information disclosure in squid (Alpine package) Low
Patched
11.11.2019
SB2018022817: NULL pointer derefenrece in squid (Alpine package) Medium
Patched
28.02.2018


Showing elements 1 - 20 out of 26

  • Previous
  • 2
  • Next

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or