Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u2?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u2?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-4738-xk8n-hbac Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. CVE-2024-38311
VCID-4uhe-mtbx-nfdu Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. CVE-2024-56195
VCID-c62p-6ghw-j3dv Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. CVE-2024-50305
VCID-jabw-thzt-63bb Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. CVE-2024-50306
VCID-kjah-am9e-xkev Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. CVE-2024-56202
VCID-rcdg-j23x-xfbn Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. CVE-2024-38479

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T07:55:35.203630+00:00 Debian Importer Fixing VCID-kjah-am9e-xkev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:35.132491+00:00 Debian Importer Fixing VCID-4uhe-mtbx-nfdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:35.049717+00:00 Debian Importer Fixing VCID-jabw-thzt-63bb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:35.019445+00:00 Debian Importer Fixing VCID-c62p-6ghw-j3dv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:34.960443+00:00 Debian Importer Fixing VCID-rcdg-j23x-xfbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:34.929099+00:00 Debian Importer Fixing VCID-4738-xk8n-hbac https://security-tracker.debian.org/tracker/data/json 38.1.0