-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4805-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 07, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : trafficserver CVE ID : CVE-2020-17508 CVE-2020-17509 Two vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server: CVE-2020-17508 The ESI plugin was vulnerable to memory disclosure. CVE-2020-17509 The negative cache option was vulnerable to cache poisoning. For the stable distribution (buster), these problems have been fixed in version 8.0.2+ds-1+deb10u4. We recommend that you upgrade your trafficserver packages. For the detailed security status of trafficserver please refer to its security tracker page at: https://security-tracker.debian.org/tracker/trafficserver Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl/OoCEACgkQEMKTtsN8 TjYceQ/+MyOmeCR1pqHeUoXovPjZWLE6eGLZdHLqCM3MQmOpYwuXXtjNSe9ViNdy ZWvdJbmZZ9QPPhVO+oxb4teodAUxT7/J/AMxQxlYbQFY8MQrTGvxb1ef22B7UafT c4tz9K5oTRrFzR385Zu0EZe7Eq8mRPOlhjVqLyeH1Xndf/QtN9H5k6dx4FtUiGCJ B4K7lRnrvJMYlGv7HJvcPTFxRKSiiwkS5JgcuY+vUtgWWB5mNwa+8v29j2QG9VQC N+eqV+JMvJ74ettqWkHk+OLOqbh5Txb6Az5I6TceDacdaVvlNcPF6x79IkwOZOXu sNwFKlQ5qyMf8KFEXD7YeJ5wrrlXD1e12cYZM+ICFEVdHC0VIJPJ5Kxp/ykjIE0C dznfbObWt7Rp9m+QLW2eVjOwUWBUV8E1ZMp5JCUjArmHuHAjvmG3bmYSjqwMtB4n JEUDMa/L23WoAZWhbXC6bZCjpBXwlUKJ9687Ff41VxRnDeCsmywX+8JQeNwO5GQj UPq8+nNS+cerl4WMw5QBKIGB3nRPEroy0dlya1/DthnjzE9tglZYhMUBfRoT1rjy NsJdMFeEUYJUe2tl4se8oOj0UOxYC7vmMkyfIa5s9ckODhJ4Vj4GYdJOWULJ5JMf 9fsx32s7xWAQFvgoBAOsTdvJIZ4URZ4ueLzRzMYQZP1bKxvU7jc= =VWdK -----END PGP SIGNATURE-----