[ https://issues.apache.org/jira/browse/CASSANDRA-15121?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16835699#comment-16835699 ]
Cisco Talos commented on CASSANDRA-15121: ----------------------------------------- 2019-05-08 Issue emailed to [secur...@apache.org|mailto:secur...@apache.org] per Sam Tunnicliffe at j...@apache.org > Apache Cassandra session reuse vulnerability (TALOS-2019-0828) > -------------------------------------------------------------- > > Key: CASSANDRA-15121 > URL: https://issues.apache.org/jira/browse/CASSANDRA-15121 > Project: Cassandra > Issue Type: Bug > Reporter: Cisco Talos > Priority: Normal > > Hello, the Cisco Talos team found a security vulnerability affecting Apache > Cassandra. An exploitable authentication vulnerability exists in Apache > Cassandra, versions 2.1.14 and 3.11.3. > As this is a sensitive security issue, please confirm maintainer for this > issue to accept the detailed security advisory report and trigger input files. > > For further information about the Cisco Vendor Vulnerability Reporting and > Disclosure Policy please refer to this document which also links to our > public PGP key. > https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html > Please CC [vuln...@cisco.com|mailto:vuln...@cisco.com] on all correspondence > related to this issue. > -- This message was sent by Atlassian JIRA (v7.6.3#76005) --------------------------------------------------------------------- To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org For additional commands, e-mail: commits-h...@cassandra.apache.org