Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 13 Oct 2023 09:01:36 -0500
From: Jonathan Wright <jonathan@...alinux.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against
 many implementations

OpenLitespeed is not impacted:
https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/

On Tue, Oct 10, 2023 at 2:23 PM Moritz Muehlenhoff <jmm@...til.org> wrote:

> On Tue, Oct 10, 2023 at 11:40:06AM -0700, Alan Coopersmith wrote:
> > Information I've found so far on open source implementations (most via
> the
> > current listings in the CVE) include:
>
> Apache Trafficserver is also affected:
> https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
>
> Cheers,
>         Moritz
>


-- 
Jonathan Wright
AlmaLinux Foundation
Mattermost: chat <https://chat.almalinux.org/almalinux/messages/@jonathan>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.