Search for packages
| purl | pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u2?distro=sid |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4738-xk8n-hbac | Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. |
CVE-2024-38311
|
| VCID-4uhe-mtbx-nfdu | Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. |
CVE-2024-56195
|
| VCID-c62p-6ghw-j3dv | Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. |
CVE-2024-50305
|
| VCID-jabw-thzt-63bb | Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. |
CVE-2024-50306
|
| VCID-kjah-am9e-xkev | Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. |
CVE-2024-56202
|
| VCID-rcdg-j23x-xfbn | Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. |
CVE-2024-38479
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-03T07:55:35.203630+00:00 | Debian Importer | Fixing | VCID-kjah-am9e-xkev | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:55:35.132491+00:00 | Debian Importer | Fixing | VCID-4uhe-mtbx-nfdu | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:55:35.049717+00:00 | Debian Importer | Fixing | VCID-jabw-thzt-63bb | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:55:35.019445+00:00 | Debian Importer | Fixing | VCID-c62p-6ghw-j3dv | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:55:34.960443+00:00 | Debian Importer | Fixing | VCID-rcdg-j23x-xfbn | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:55:34.929099+00:00 | Debian Importer | Fixing | VCID-4738-xk8n-hbac | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |