Date: Tue, 27 Feb 2018 10:31:15 -0800 From: Bryan Call <bcall@...che.org> To: dev <dev@...fficserver.apache.org>, users <users@...fficserver.apache.org>, announce@...fficserver.apache.org, security@...fficserver.apache.org, oss-security@...ts.openwall.com Subject: [ANNOUNCE] Apache Traffic Server vulnerability with TLS handshake - CVE-2017-7671 CVE-2017-7671: Apache Traffic Server vulnerability with TLS handshake Vendor: The Apache Software Foundation Version Affected: ATS 5.2.0 to 5.3.2 ATS 6.0.0 to 6.2.0 ATS 7.0.0 Description: There is a DOS attack vulnerability in ATS with the TLS handshake. This issue can cause the server to coredump. Mitigation: 5.x users should upgrade to 7.1.2 or later versions 6.x users should upgrade to 6.2.2 or later versions 7.x users should upgrade to 7.1.2 or later versions References: Downloads: https://trafficserver.apache.org/downloads Github Pull Request: https://github.com/apache/trafficserver/pull/1941 CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7671 -Bryan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ