Search for packages
purl | pkg:deb/debian/trafficserver@9.2.5%2Bds-1 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4964-fbua-d3dh
Aliases: CVE-2024-38311 |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. | There are no reported fixed by versions. |
VCID-4nrj-yn3r-fye2
Aliases: CVE-2024-50305 |
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. | There are no reported fixed by versions. |
VCID-ew3m-w5p7-skhh
Aliases: CVE-2024-56202 |
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. | There are no reported fixed by versions. |
VCID-h9wv-5sxv-87e9
Aliases: CVE-2024-50306 |
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. | There are no reported fixed by versions. |
VCID-nm4c-5vwj-m7cz
Aliases: CVE-2024-38479 |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. | There are no reported fixed by versions. |
VCID-xkj8-pxen-xfaw
Aliases: CVE-2024-56195 |
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-22T02:50:29.966084+00:00 | Debian Importer | Affected by | VCID-ew3m-w5p7-skhh | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T22:53:51.364384+00:00 | Debian Importer | Affected by | VCID-xkj8-pxen-xfaw | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T23:48:05.676999+00:00 | Debian Importer | Affected by | VCID-4nrj-yn3r-fye2 | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T20:28:04.017065+00:00 | Debian Importer | Affected by | VCID-h9wv-5sxv-87e9 | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T19:56:07.318828+00:00 | Debian Importer | Affected by | VCID-nm4c-5vwj-m7cz | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-05T14:17:48.262744+00:00 | Debian Importer | Affected by | VCID-h9wv-5sxv-87e9 | https://security-tracker.debian.org/tracker/data/json | 36.1.0 |
2025-06-05T14:01:45.011200+00:00 | Debian Importer | Affected by | VCID-nm4c-5vwj-m7cz | https://security-tracker.debian.org/tracker/data/json | 36.1.0 |
2025-04-09T05:08:43.247863+00:00 | Debian Importer | Affected by | VCID-4nrj-yn3r-fye2 | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-06T22:17:23.525060+00:00 | Debian Importer | Affected by | VCID-4964-fbua-d3dh | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-06T19:22:30.104162+00:00 | Debian Importer | Affected by | VCID-xkj8-pxen-xfaw | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-06T14:52:33.458744+00:00 | Debian Importer | Affected by | VCID-ew3m-w5p7-skhh | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-06T06:10:53.468689+00:00 | Debian Importer | Affected by | VCID-nm4c-5vwj-m7cz | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-03T23:16:48.549172+00:00 | Debian Importer | Affected by | VCID-h9wv-5sxv-87e9 | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |