FEDORA-2022-2ff503c5d4
Packages in this update:
apptainer-1.1.2-1.fc35
Update description:
Update to 1.1.2
apptainer-1.1.2-1.fc35
Update to 1.1.2
apptainer-1.1.2-1.el9
Update to 1.1.2
apptainer-1.1.2-1.el8
Update to 1.1.2
USN-5371-1 and USN-5371-2 fixed several vulnerabilities in nginx.
This update provides the corresponding update for CVE-2020-11724
for Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue was fixed for Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)
It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
mod_security-2.9.6-1.fc35
mod_security_crs-3.3.4-1.fc35
version update
security update
mod_security-2.9.6-1.fc36
mod_security_crs-3.3.4-1.fc36
version update
security update
mod_security-2.9.6-1.fc37
mod_security_crs-3.3.4-1.fc37
version update
security fixes
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.