10.07.2024 03:45 * bsc#1215823 * bsc#1215831 Cross-References: * CVE-2021-26345
10.07.2024 03:45 * bsc#1217653 Cross-References: * CVE-2023-45539
10.07.2024 03:45 * bsc#1217969 Cross-References: * CVE-2023-39804
10.07.2024 03:45 * bsc#1198146 Cross-References: * CVE-2022-1210
10.07.2024 03:45 * bsc#1218251 Cross-References: * CVE-2022-4603
09.07.2024 17:45 * bsc#1220145 * bsc#1223363 * bsc#1223683 * bsc#1225211
09.07.2024 17:45 Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance. Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend
09.07.2024 17:45 Tomcat could allow unintended access to network services.
09.07.2024 17:45 This update fixes CVE-2024-24791
09.07.2024 17:45 Security fix for CVE-2024-38439, CVE-2024-38440, and CVE-2024-38441
09.07.2024 17:45 Update the sequoia-openpgp crate to version 1.21.1. Addresses RUSTSEC-2024-0345. Update the sequoia-keystore crate to version 0.5.1. Update the sequoia-gpg-agent crate to version 0.4.2. This update also includes rebuilds of all affected applications that are affected by RUSTSEC-2024-0345 and a regression in sequoia-openpgp 1.21.0.
09.07.2024 07:45 * bsc#1220145 * bsc#1223363 * bsc#1223683 Cross-References:
09.07.2024 07:45 Several security issues were fixed in Apache HTTP Server.
09.07.2024 07:45 * bsc#1227186 * bsc#1227187 Cross-References: * CVE-2024-37370
09.07.2024 07:45 * bsc#1224788 Cross-References: * CVE-2024-35195