|
Message-Id: <0328E5ED-8D75-4C17-99A6-5D65B3AF4E5E@apache.org> Date: Tue, 27 Feb 2018 09:38:23 -0800 From: Bryan Call <bcall@...che.org> To: dev <dev@...fficserver.apache.org>, users <users@...fficserver.apache.org>, announce@...fficserver.apache.org, security@...fficserver.apache.org, oss-security@...ts.openwall.com Subject: [ANNOUNCE] Apache Traffic Server host header and line folding - CVE-2017-5660 CVE-2017-5660: Apache Traffic Server host header and line folding Vendor: The Apache Software Foundation Version Affected: ATS 6.2.0 and prior ATS 7.0.0 and prior Description: There is a vulnerability in ATS with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used. Mitigation: 6.2.x users should upgrade to 6.2.2 or later versions 7.x users should upgrade to 7.1.2 or later versions References: Downloads: https://trafficserver.apache.org/downloads Github Pull Request: https://github.com/apache/trafficserver/pull/1657 CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5660 -Bryan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.