First published: Tue Aug 28 2018(Updated: )
When there are multiple ranges in a range request, Apache Traffic Server (ATS) will read the entire object from cache. This can cause performance problems with large objects in cache. This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x users should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=6.0.0<=6.2.2 | |
Apache Traffic Server | >=7.0.0<=7.1.3 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8005 is a vulnerability in Apache Traffic Server that can cause performance problems when there are multiple ranges in a range request.
Versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3 of Apache Traffic Server are affected.
To resolve this issue, users running version 6.x should upgrade to version 8.0.2+ds-1+deb10u6 or higher.
Yes, users running version 7.x should upgrade to version 8.1.7-0+deb10u2 or higher.
You can find more information about CVE-2018-8005 at the following references: [Reference 1](https://www.openwall.com/lists/oss-security/2018/08/29/4), [Reference 2](https://github.com/apache/trafficserver/pull/3106), [Reference 3](https://github.com/apache/trafficserver/pull/3124).