Name | CVE-2018-21245 |
Description | Pound before 2.8 allows HTTP request smuggling, a related issue to CVE-2016-10711. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
pound (PTS) | bullseye | 3.0-2 | fixed |
| sid, trixie | 4.15-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
pound | source | jessie | 2.6-6+deb8u2 | | | |
pound | source | stretch | 2.7-1.3+deb9u1 | | | |
pound | source | (unstable) | 2.8-2 | | | |
Notes
https://admin.hostpoint.ch/pipermail/pound_apsis.ch/2018-May/000054.html
The exact scope of CVE-2018-21245 (a related issue to CVE-2016-10711) was
as well fixed with the same changes as done upstream for 2.8. The backport
for 2.7 was a backport of all security relevant changes between 2.7 and 2.8.
The same corrections were made in 2.6 version for jessie so fixed in that too.