drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in trafficserver
Name: |
Zwei Probleme in trafficserver |
|
ID: |
DSA-4805-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Mo, 7. Dezember 2020, 23:27 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509 |
|
Applikationen: |
Apache Traffic Server |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4805-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 07, 2020 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : trafficserver CVE ID : CVE-2020-17508 CVE-2020-17509
Two vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server:
CVE-2020-17508
The ESI plugin was vulnerable to memory disclosure.
CVE-2020-17509
The negative cache option was vulnerable to cache poisoning.
For the stable distribution (buster), these problems have been fixed in version 8.0.2+ds-1+deb10u4.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to its security tracker page at: https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl/OoCEACgkQEMKTtsN8 TjYceQ/+MyOmeCR1pqHeUoXovPjZWLE6eGLZdHLqCM3MQmOpYwuXXtjNSe9ViNdy ZWvdJbmZZ9QPPhVO+oxb4teodAUxT7/J/AMxQxlYbQFY8MQrTGvxb1ef22B7UafT c4tz9K5oTRrFzR385Zu0EZe7Eq8mRPOlhjVqLyeH1Xndf/QtN9H5k6dx4FtUiGCJ B4K7lRnrvJMYlGv7HJvcPTFxRKSiiwkS5JgcuY+vUtgWWB5mNwa+8v29j2QG9VQC N+eqV+JMvJ74ettqWkHk+OLOqbh5Txb6Az5I6TceDacdaVvlNcPF6x79IkwOZOXu sNwFKlQ5qyMf8KFEXD7YeJ5wrrlXD1e12cYZM+ICFEVdHC0VIJPJ5Kxp/ykjIE0C dznfbObWt7Rp9m+QLW2eVjOwUWBUV8E1ZMp5JCUjArmHuHAjvmG3bmYSjqwMtB4n JEUDMa/L23WoAZWhbXC6bZCjpBXwlUKJ9687Ff41VxRnDeCsmywX+8JQeNwO5GQj UPq8+nNS+cerl4WMw5QBKIGB3nRPEroy0dlya1/DthnjzE9tglZYhMUBfRoT1rjy NsJdMFeEUYJUe2tl4se8oOj0UOxYC7vmMkyfIa5s9ckODhJ4Vj4GYdJOWULJ5JMf 9fsx32s7xWAQFvgoBAOsTdvJIZ4URZ4ueLzRzMYQZP1bKxvU7jc= =VWdK -----END PGP SIGNATURE-----
|
|
|
|