Security Advisory Description A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec ...
More info:
https://my.f5.com/manage/s/article/K000135252?utm_source=f5support&utm_medium=RSS
Security Advisory Description A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting ...
More info:
https://my.f5.com/manage/s/article/K000135242?utm_source=f5support&utm_medium=RSS
Security Advisory Description A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_ ...
More info:
https://my.f5.com/manage/s/article/K000135223?utm_source=f5support&utm_medium=RSS
Security Advisory Description In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations ...
More info:
https://my.f5.com/manage/s/article/K000135206?utm_source=f5support&utm_medium=RSS
Security Advisory Description In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled ...
More info:
https://my.f5.com/manage/s/article/K21054458?utm_source=f5support&utm_medium=RSS
Security Advisory Description Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request ...
More info:
https://my.f5.com/manage/s/article/K67090077?utm_source=f5support&utm_medium=RSS
Security Advisory Description In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the systems ...
More info:
https://my.f5.com/manage/s/article/K18484125?utm_source=f5support&utm_medium=RSS
Security Advisory Description A memory out-of-bounds read flaw was found in the Linux kernels ext3/ext4 file system in the way it accesses a directory with broken indexing. This flaw allows a ...
More info:
https://my.f5.com/manage/s/article/K67830124?utm_source=f5support&utm_medium=RSS
Security Advisory Description Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input ...
More info:
https://my.f5.com/manage/s/article/K40582331?utm_source=f5support&utm_medium=RSS
Security Advisory Description Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt( ...
More info:
https://my.f5.com/manage/s/article/K000135178?utm_source=f5support&utm_medium=RSS