|
|
Message-ID: <20231010192306.GA14591@inutil.org>
Date: Tue, 10 Oct 2023 21:23:06 +0200
From: Moritz Muehlenhoff <jmm@...til.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against
many implementations
On Tue, Oct 10, 2023 at 11:40:06AM -0700, Alan Coopersmith wrote:
> Information I've found so far on open source implementations (most via the
> current listings in the CVE) include:
Apache Trafficserver is also affected:
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
Cheers,
Moritz
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.