Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/trafficserver@9.2.5%2Bds-1
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.1
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-4738-xk8n-hbac
Aliases:
CVE-2024-38311
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. There are no reported fixed by versions.
VCID-4hs3-be7k-9qe7
Aliases:
CVE-2025-65114
Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1. Users are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue. There are no reported fixed by versions.
VCID-4uhe-mtbx-nfdu
Aliases:
CVE-2024-56195
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. There are no reported fixed by versions.
VCID-5e1r-3jec-tkhp
Aliases:
CVE-2025-49763
trafficserver: Traffic Server ESI Inclusion Depth Vulnerability There are no reported fixed by versions.
VCID-c62p-6ghw-j3dv
Aliases:
CVE-2024-50305
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. There are no reported fixed by versions.
VCID-eay7-63um-43e9
Aliases:
CVE-2024-53868
Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue. There are no reported fixed by versions.
VCID-jabw-thzt-63bb
Aliases:
CVE-2024-50306
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. There are no reported fixed by versions.
VCID-kjah-am9e-xkev
Aliases:
CVE-2024-56202
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. There are no reported fixed by versions.
VCID-rcdg-j23x-xfbn
Aliases:
CVE-2024-38479
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. There are no reported fixed by versions.
VCID-tevw-8dcp-yfh6
Aliases:
CVE-2025-31698
trafficserver: Apache Traffic Server PROXY Protocol ACL Bypass There are no reported fixed by versions.
VCID-ww3t-p3pq-gkhy
Aliases:
CVE-2025-58136
A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0). There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:52:39.999601+00:00 Debian Importer Affected by VCID-kjah-am9e-xkev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:22.459243+00:00 Debian Importer Affected by VCID-ww3t-p3pq-gkhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:33.320143+00:00 Debian Importer Affected by VCID-4uhe-mtbx-nfdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:56.684320+00:00 Debian Importer Affected by VCID-jabw-thzt-63bb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:09.386383+00:00 Debian Importer Affected by VCID-c62p-6ghw-j3dv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:03.912784+00:00 Debian Importer Affected by VCID-5e1r-3jec-tkhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:54.448867+00:00 Debian Importer Affected by VCID-tevw-8dcp-yfh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:53.095262+00:00 Debian Importer Affected by VCID-4hs3-be7k-9qe7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:37.348190+00:00 Debian Importer Affected by VCID-4738-xk8n-hbac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:04.745665+00:00 Debian Importer Affected by VCID-eay7-63um-43e9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:36.388782+00:00 Debian Importer Affected by VCID-rcdg-j23x-xfbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:50:25.450395+00:00 Debian Importer Affected by VCID-kjah-am9e-xkev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:20.763094+00:00 Debian Importer Affected by VCID-ww3t-p3pq-gkhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:47.037899+00:00 Debian Importer Affected by VCID-4uhe-mtbx-nfdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:47.340494+00:00 Debian Importer Affected by VCID-jabw-thzt-63bb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:19.481803+00:00 Debian Importer Affected by VCID-c62p-6ghw-j3dv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:38.630890+00:00 Debian Importer Affected by VCID-5e1r-3jec-tkhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:37.432550+00:00 Debian Importer Affected by VCID-tevw-8dcp-yfh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:55.810075+00:00 Debian Importer Affected by VCID-4hs3-be7k-9qe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:10.555287+00:00 Debian Importer Affected by VCID-4738-xk8n-hbac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:46.094804+00:00 Debian Importer Affected by VCID-eay7-63um-43e9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:33.232671+00:00 Debian Importer Affected by VCID-rcdg-j23x-xfbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T19:52:56.977769+00:00 Debian Importer Affected by VCID-kjah-am9e-xkev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:31:00.203360+00:00 Debian Importer Affected by VCID-ww3t-p3pq-gkhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:58.719634+00:00 Debian Importer Affected by VCID-4uhe-mtbx-nfdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:44.304658+00:00 Debian Importer Affected by VCID-jabw-thzt-63bb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:05.811511+00:00 Debian Importer Affected by VCID-c62p-6ghw-j3dv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:06.048805+00:00 Debian Importer Affected by VCID-5e1r-3jec-tkhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:28.067698+00:00 Debian Importer Affected by VCID-4hs3-be7k-9qe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:23.525154+00:00 Debian Importer Affected by VCID-tevw-8dcp-yfh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:07:44.835758+00:00 Debian Importer Affected by VCID-4738-xk8n-hbac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:30:16.717507+00:00 Debian Importer Affected by VCID-eay7-63um-43e9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:03:20.075467+00:00 Debian Importer Affected by VCID-rcdg-j23x-xfbn https://security-tracker.debian.org/tracker/data/json 38.1.0