Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 13 Mar 2019 08:47:13 -0400
From: "James E. King III" <>
To: "James E. King III" <>
Cc:, security <>,,
Subject: Re: [SECURITY] CVE-2018-1320 Apache Thrift SASL negotiation
 vulnerability (update)

This is an update to a previously announced CVE.  The specific change
in the update is that a new version of Apache Thrift was
released per community request.  The following fields changed from the
previous announcement:

Versions Affected

The new content of the CVE announcement is as follows:

Reported By: Sudheesh Katkam
Vendor: The Apache Software Foundation
Product: Apache Thrift
Problem Type: Improper Authentication
Versions Affected: Apache Thrift versions 0.5.0 through 0.11.0, except
Mitigation: Upgrading to or to the latest 0.12.0 release

Apache Thrift Java client library TSaslTransport can bypass SASL negotiation
isComplete validation. An assert was previously used to determine if the
SASL handshake had successfully completed, but in some cases this assertion
could be disabled in production settings making the validation incomplete.

The assertion has been removed and an isComplete check has
been moved within the handshake processing loop. The fix is contained
in the 0.12.0 Apache Thrift release as has also been backported to the release, also available on maven central.  0.12.0 was released
on January 4, 2019 and was released on March 13, 2019.

Jira issue:

Mitre issue:

Committed resolution:

On behalf of the Apache Thrift PMC,

Thank you

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.