Search for packages
Package details: pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u2
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (9)
Vulnerability Summary Aliases
VCID-18my-ahn7-aaas Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. CVE-2024-35296
VCID-4964-fbua-d3dh Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. CVE-2024-38311
VCID-4nrj-yn3r-fye2 Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. CVE-2024-50305
VCID-ew3m-w5p7-skhh Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. CVE-2024-56202
VCID-h9wv-5sxv-87e9 Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. CVE-2024-50306
VCID-nm4c-5vwj-m7cz Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. CVE-2024-38479
VCID-ux2d-92n5-aaan Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. CVE-2024-35161
VCID-xkj8-pxen-xfaw Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. CVE-2024-56195
VCID-zxzg-398f-aaaj Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. CVE-2023-38522

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-22T02:50:29.961994+00:00 Debian Importer Fixing VCID-ew3m-w5p7-skhh https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-22T02:32:10.988791+00:00 Debian Importer Fixing VCID-18my-ahn7-aaas https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T22:53:51.361270+00:00 Debian Importer Fixing VCID-xkj8-pxen-xfaw https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T12:07:31.765057+00:00 Debian Importer Fixing VCID-zxzg-398f-aaaj https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T03:43:28.620056+00:00 Debian Importer Fixing VCID-ux2d-92n5-aaan https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-20T23:48:05.672929+00:00 Debian Importer Fixing VCID-4nrj-yn3r-fye2 https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-02T10:03:27.911803+00:00 Debian Importer Fixing VCID-4964-fbua-d3dh https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-06-01T12:03:25.035235+00:00 Debian Importer Fixing VCID-ew3m-w5p7-skhh https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-06-01T11:52:28.425468+00:00 Debian Importer Fixing VCID-18my-ahn7-aaas https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-06-01T09:55:39.571094+00:00 Debian Importer Fixing VCID-xkj8-pxen-xfaw https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-05-20T07:55:16.019337+00:00 Debian Importer Fixing VCID-ux2d-92n5-aaan https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-05-20T04:17:38.697891+00:00 Debian Importer Fixing VCID-4nrj-yn3r-fye2 https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-05-17T19:05:15.193324+00:00 Debian Importer Fixing VCID-zxzg-398f-aaaj https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-24T03:42:56.671521+00:00 Debian Importer Fixing VCID-nm4c-5vwj-m7cz https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-21T23:57:10.783606+00:00 Debian Importer Fixing VCID-h9wv-5sxv-87e9 https://security-tracker.debian.org/tracker/data/json 36.0.0