Search for packages
Package details: pkg:deb/debian/trafficserver@9.2.5%2Bds-1
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.1
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-4wv5-y778-cydd
Aliases:
CVE-2024-53868
Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue. There are no reported fixed by versions.
VCID-68w5-p8ud-eybj
Aliases:
CVE-2025-49763
ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue. There are no reported fixed by versions.
VCID-76av-km9w-7fhk
Aliases:
CVE-2024-56195
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. There are no reported fixed by versions.
VCID-9nex-8kjb-9kaz
Aliases:
CVE-2024-38311
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. There are no reported fixed by versions.
VCID-ba1k-fjyk-jbet
Aliases:
CVE-2024-56202
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. There are no reported fixed by versions.
VCID-dn7e-xgnt-sbcm
Aliases:
CVE-2025-31698
ACL configured in ip_allow.config or remap.config does not use IP addresses that are provided by PROXY protocol. Users can use a new setting (proxy.config.acl.subjects) to choose which IP addresses to use for the ACL if Apache Traffic Server is configured to accept PROXY protocol.  This issue affects undefined: from 10.0.0 through 10.0.6, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue. There are no reported fixed by versions.
VCID-suuy-3kv9-2kag
Aliases:
CVE-2024-50305
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. There are no reported fixed by versions.
VCID-thb6-77ut-xuau
Aliases:
CVE-2024-38479
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. There are no reported fixed by versions.
VCID-wxpd-r9sw-pqhx
Aliases:
CVE-2024-50306
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T13:21:35.648680+00:00 Debian Importer Affected by VCID-9nex-8kjb-9kaz https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:15:42.428708+00:00 Debian Importer Affected by VCID-68w5-p8ud-eybj https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:58:29.797719+00:00 Debian Importer Affected by VCID-suuy-3kv9-2kag https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:45:52.587859+00:00 Debian Importer Affected by VCID-4wv5-y778-cydd https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:43:01.603554+00:00 Debian Importer Affected by VCID-ba1k-fjyk-jbet https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:40:16.908238+00:00 Debian Importer Affected by VCID-76av-km9w-7fhk https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:32:45.465208+00:00 Debian Importer Affected by VCID-wxpd-r9sw-pqhx https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:21:35.631227+00:00 Debian Importer Affected by VCID-dn7e-xgnt-sbcm https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:12:06.139800+00:00 Debian Importer Affected by VCID-thb6-77ut-xuau https://security-tracker.debian.org/tracker/data/json 37.0.0