[ANNOUNCE] Apache Traffic Server is vulnerable to specific user inputs

2024-11-13 Thread Masakazu Kitajo
Description: Apache Traffic Server is vulnerable to specific user inputs CVE: CVE-2024-38479 - Cache key plugin is vulnerable to cache poisoning attack CVE-2024-50305 - Valid Host field value can cause crashes CVE-2024-50306 - Server process can fail to drop privilege Reported By: Bryan Call (CVE

[ANNOUNCE] Apache Traffic Server 10.0.2 and 9.2.6 are released

2024-11-13 Thread Chris McFarlen
Apache Traffic Server 10.0.2 and 9.2.6 are released The Apache Software Foundation and the Apache Traffic Server (ATS) Project are pleased to announce the release of Apache Traffic Server 10.0.2 and 9.2.6! ATS is a high performance, scalable HTTP Intermediary and proxy cache. It is used by se

Re: [VOTE] Release Apache Traffic Server 10.0.2 (RC0)

2024-11-13 Thread Brian Neradt
+1 This is running on our docs server now and has been since yesterday. It has been stable and I've noticed no functional issues. On Wed, Nov 13, 2024 at 10:16 AM Chris McFarlen wrote: > +1, built and tested on ubuntu, unit tests pass. > > Chris > > Sent with Proton Mail secure email. > > On We

Re: [VOTE] Release Apache Traffic Server 10.0.2 (RC0)

2024-11-13 Thread Chris McFarlen
+1, built and tested on ubuntu, unit tests pass. Chris Sent with Proton Mail secure email. On Wednesday, November 13th, 2024 at 10:11 AM, Evan Zelkowitz wrote: > +1 > > Built and ran tests on Rocky 8 > > On Tue, Nov 12, 2024 at 1:16 PM Chris McFarlen ch...@mcfarlen.us wrote: > > > I've pre

Re: [VOTE] Release Apache Traffic Server 10.0.2 (RC0)

2024-11-13 Thread Evan Zelkowitz
+1 Built and ran tests on Rocky 8 On Tue, Nov 12, 2024 at 1:16 PM Chris McFarlen wrote: > I've prepared a release for 10.0.2. The release notes are available at: > > https://github.com/apache/trafficserver/milestone/78?closed=1 > > https://docs.trafficserver.apache.org/en/latest/release-notes/u

Re: [VOTE] Release Apache Traffic Server 9.2.6 (RC0)

2024-11-13 Thread Jered Floyd
A few warnings if you are using these Fedora "official" and EPEL builds (I'm guessing not many, as per below): - RHEL 9.5 is currently releasing, which updates to OpenSSL 3.2.2. The existing 9.2.5 builds in EPEL *will not be able to contact TLS origin servers* due to https://github.com/apach