Known vulnerabilities in Canonical Ltd. ding-libs (Ubuntu package) 0.1.2-0ubuntu1

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Canonical Ltd. › ding-libs (Ubuntu package) › 0.1.2-0ubuntu1

Known vulnerabilities in Canonical Ltd. ding-libs (Ubuntu package) 0.1.2-0ubuntu1

Vendor: Canonical Ltd.
Website: https://www.ubuntu.com/
Total Security Bulletins: 22
0.6.2-3 0.6.2-2.1build1 0.6.2-2 0.6.2-2.1 0.6.2-1 0.6.1-2build2 0.6.1-2build1 0.1.3 0.6.1 0.5.0 0.3.0.1 0.6.1-1 0.6.1-2 0.6.0-1 0.5.0-1ubuntu0.16.04.1 0.5.0-1 0.1.2-0ubuntu1 0.1.3-1 0.1.3-2 0.3.0.1-1 0.3.0.1-2 0.3.0.1-3 0.3.0.1-4 0.4.0-1

Security bulletins (22)

Secuity bulletin Severity Status Published
SB2020101606: Input validation error in pdns-recursor (Alpine package) Medium
Patched
16.10.2020
SB2020070169: Improper access control in pdns-recursor (Alpine package) Medium
Patched
01.07.2020
SB2020052142: Out-of-bounds read in pdns-recursor (Alpine package) Low
Patched
21.05.2020
SB2019012109: Security restrictions bypass in pdns-recursor (Alpine package) Low
Patched
21.01.2019
SB2018112622: Out-of-bounds read in pdns-recursor (Alpine package) Low
Patched
26.11.2018
SB2018111929: Improper input validation in pdns-recursor (Alpine package) Low
Patched
19.11.2018
SB2018110920: Memory leak in pdns-recursor (Alpine package) Low
Patched
09.11.2018
SB2018110922: Improper input validation in pdns-recursor (Alpine package) Low
Patched
09.11.2018


Showing elements 1 - 20 out of 22

  • Previous
  • 2
  • Next

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or