Search for packages
purl | pkg:deb/debian/trafficserver@9.2.5%2Bds-1 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4wv5-y778-cydd
Aliases: CVE-2024-53868 |
Apache Traffic Server allows request smuggling if chunked messages are malformed. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue. | There are no reported fixed by versions. |
VCID-68w5-p8ud-eybj
Aliases: CVE-2025-49763 |
ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue. | There are no reported fixed by versions. |
VCID-76av-km9w-7fhk
Aliases: CVE-2024-56195 |
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. | There are no reported fixed by versions. |
VCID-9nex-8kjb-9kaz
Aliases: CVE-2024-38311 |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. | There are no reported fixed by versions. |
VCID-ba1k-fjyk-jbet
Aliases: CVE-2024-56202 |
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. | There are no reported fixed by versions. |
VCID-dn7e-xgnt-sbcm
Aliases: CVE-2025-31698 |
ACL configured in ip_allow.config or remap.config does not use IP addresses that are provided by PROXY protocol. Users can use a new setting (proxy.config.acl.subjects) to choose which IP addresses to use for the ACL if Apache Traffic Server is configured to accept PROXY protocol. This issue affects undefined: from 10.0.0 through 10.0.6, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue. | There are no reported fixed by versions. |
VCID-suuy-3kv9-2kag
Aliases: CVE-2024-50305 |
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. | There are no reported fixed by versions. |
VCID-thb6-77ut-xuau
Aliases: CVE-2024-38479 |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. | There are no reported fixed by versions. |
VCID-wxpd-r9sw-pqhx
Aliases: CVE-2024-50306 |
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-08-01T13:21:35.648680+00:00 | Debian Importer | Affected by | VCID-9nex-8kjb-9kaz | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T13:15:42.428708+00:00 | Debian Importer | Affected by | VCID-68w5-p8ud-eybj | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:58:29.797719+00:00 | Debian Importer | Affected by | VCID-suuy-3kv9-2kag | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:45:52.587859+00:00 | Debian Importer | Affected by | VCID-4wv5-y778-cydd | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:43:01.603554+00:00 | Debian Importer | Affected by | VCID-ba1k-fjyk-jbet | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:40:16.908238+00:00 | Debian Importer | Affected by | VCID-76av-km9w-7fhk | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:32:45.465208+00:00 | Debian Importer | Affected by | VCID-wxpd-r9sw-pqhx | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:21:35.631227+00:00 | Debian Importer | Affected by | VCID-dn7e-xgnt-sbcm | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |
2025-08-01T12:12:06.139800+00:00 | Debian Importer | Affected by | VCID-thb6-77ut-xuau | https://security-tracker.debian.org/tracker/data/json | 37.0.0 |