CVE-2018-8022

Source
https://cve.org/CVERecord?id=CVE-2018-8022
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8022.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-8022
Downstream
Published
2018-08-29T13:29:02.107Z
Modified
2026-03-14T09:31:14.165838Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.

References

Affected packages

Git / github.com/apache/trafficserver

Affected ranges

Type
GIT
Repo
https://github.com/apache/trafficserver
Events
Database specific
{
    "versions": [
        {
            "introduced": "6.0.0"
        },
        {
            "last_affected": "6.2.2"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8022.json"