Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:golang/github.com/traefik/traefik/v2@2.9.10
purl pkg:golang/github.com/traefik/traefik/v2@2.9.10
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-fydm-du3k-cqcg Traefik HTTP header parsing could cause a denial of service ### Impact There is a vulnerability in [Go when parsing the HTTP headers](https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8/m/OV40vnafAwAJ), which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. ### References - [CVE-2023-24534](https://www.cve.org/CVERecord?id=CVE-2023-24534) ### Patches - https://github.com/traefik/traefik/releases/tag/v2.9.10 - https://github.com/traefik/traefik/releases/tag/v2.10.0-rc2 ### Workarounds No workaround. ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues). CVE-2023-29013
GHSA-7hj9-rv74-5g92

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:57:30.730835+00:00 GithubOSV Importer Fixing VCID-fydm-du3k-cqcg https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-7hj9-rv74-5g92/GHSA-7hj9-rv74-5g92.json 38.0.0