Security Advisory Description In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations ...
More info:
https://my.f5.com/manage/s/article/K000135206?utm_source=f5support&utm_medium=RSS
Security Advisory Description In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled ...
More info:
https://my.f5.com/manage/s/article/K21054458?utm_source=f5support&utm_medium=RSS
Security Advisory Description Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request ...
More info:
https://my.f5.com/manage/s/article/K67090077?utm_source=f5support&utm_medium=RSS
Security Advisory Description In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the systems ...
More info:
https://my.f5.com/manage/s/article/K18484125?utm_source=f5support&utm_medium=RSS
Security Advisory Description A memory out-of-bounds read flaw was found in the Linux kernels ext3/ext4 file system in the way it accesses a directory with broken indexing. This flaw allows a ...
More info:
https://my.f5.com/manage/s/article/K67830124?utm_source=f5support&utm_medium=RSS
Security Advisory Description Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input ...
More info:
https://my.f5.com/manage/s/article/K40582331?utm_source=f5support&utm_medium=RSS