![]() |
|
Message-ID: <20231010192306.GA14591@inutil.org> Date: Tue, 10 Oct 2023 21:23:06 +0200 From: Moritz Muehlenhoff <jmm@...til.org> To: oss-security@...ts.openwall.com Subject: Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations On Tue, Oct 10, 2023 at 11:40:06AM -0700, Alan Coopersmith wrote: > Information I've found so far on open source implementations (most via the > current listings in the CVE) include: Apache Trafficserver is also affected: https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q Cheers, Moritz
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.