—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4805-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 07, 2020 https://www.debian.org/security/faq
– ————————————————————————-
Package : trafficserver
CVE ID : CVE-2020-17508 CVE-2020-17509
Two vulnerabilities were discovered in Apache Traffic Server, a reverse
and forward proxy server:
CVE-2020-17508
The ESI plugin was vulnerable to memory disclosure.
CVE-2020-17509
The negative cache option was vulnerable to cache poisoning.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u4.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl/OoCEACgkQEMKTtsN8
TjYceQ/+MyOmeCR1pqHeUoXovPjZWLE6eGLZdHLqCM3MQmOpYwuXXtjNSe9ViNdy
ZWvdJbmZZ9QPPhVO+oxb4teodAUxT7/J/AMxQxlYbQFY8MQrTGvxb1ef22B7UafT
c4tz9K5oTRrFzR385Zu0EZe7Eq8mRPOlhjVqLyeH1Xndf/QtN9H5k6dx4FtUiGCJ
B4K7lRnrvJMYlGv7HJvcPTFxRKSiiwkS5JgcuY+vUtgWWB5mNwa+8v29j2QG9VQC
N+eqV+JMvJ74ettqWkHk+OLOqbh5Txb6Az5I6TceDacdaVvlNcPF6x79IkwOZOXu
sNwFKlQ5qyMf8KFEXD7YeJ5wrrlXD1e12cYZM+ICFEVdHC0VIJPJ5Kxp/ykjIE0C
dznfbObWt7Rp9m+QLW2eVjOwUWBUV8E1ZMp5JCUjArmHuHAjvmG3bmYSjqwMtB4n
JEUDMa/L23WoAZWhbXC6bZCjpBXwlUKJ9687Ff41VxRnDeCsmywX+8JQeNwO5GQj
UPq8+nNS+cerl4WMw5QBKIGB3nRPEroy0dlya1/DthnjzE9tglZYhMUBfRoT1rjy
NsJdMFeEUYJUe2tl4se8oOj0UOxYC7vmMkyfIa5s9ckODhJ4Vj4GYdJOWULJ5JMf
9fsx32s7xWAQFvgoBAOsTdvJIZ4URZ4ueLzRzMYQZP1bKxvU7jc=
=VWdK
—–END PGP SIGNATURE—–