[ 
https://issues.apache.org/jira/browse/CASSANDRA-15121?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16835699#comment-16835699
 ] 

Cisco Talos commented on CASSANDRA-15121:
-----------------------------------------

2019-05-08 Issue emailed to [secur...@apache.org|mailto:secur...@apache.org] 
per Sam Tunnicliffe at j...@apache.org

> Apache Cassandra session reuse vulnerability (TALOS-2019-0828)
> --------------------------------------------------------------
>
>                 Key: CASSANDRA-15121
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-15121
>             Project: Cassandra
>          Issue Type: Bug
>            Reporter: Cisco Talos
>            Priority: Normal
>
> Hello, the Cisco Talos team found a security vulnerability affecting Apache 
> Cassandra. An exploitable authentication vulnerability exists in Apache 
> Cassandra, versions 2.1.14 and 3.11.3.
> As this is a sensitive security issue, please confirm maintainer for this 
> issue to accept the detailed security advisory report and trigger input files.
>  
> For further information about the Cisco Vendor Vulnerability Reporting and 
> Disclosure Policy please refer to this document which also links to our 
> public PGP key. 
> https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html
> Please CC [vuln...@cisco.com|mailto:vuln...@cisco.com] on all correspondence 
> related to this issue. 
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org
For additional commands, e-mail: commits-h...@cassandra.apache.org

Reply via email to