DEBIAN-CVE-2025-58136

Source
https://security-tracker.debian.org/tracker/CVE-2025-58136
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-58136.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-58136
Upstream
  • CVE-2025-58136
Published
2026-04-02T17:16:20.933Z
Modified
2026-04-05T23:00:15.378658Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.requestbufferenabled to 0 (the default value is 0).

References

Affected packages

Debian:11 / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/debian/trafficserver?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.1.1+ds-1.1
8.1.1+ds-1.1+deb11u1
8.1.5+ds-1~deb11u1
8.1.6+ds-1~deb10u1
8.1.6+ds-1~deb11u1
8.1.7+ds-1~deb11u1
8.1.9+ds-1~deb11u1
8.1.10+ds-1~deb11u1
8.1.11+ds-0+deb11u1
8.1.11+ds-0+deb11u2
9.*
9.1.0+ds-1
9.1.0+ds-2
9.1.1+ds-1
9.1.1+ds-2
9.1.2+ds-1
9.1.2+ds-2
9.1.2+ds-3
9.1.2+ds-4
9.1.2+ds-5
9.1.2+ds-6
9.1.2+ds-7
9.1.2+ds-8
9.1.2+ds-9
9.1.2+ds-10
9.1.2+ds-11
9.1.2+ds-12
9.1.2+ds-13
9.1.3+ds-1
9.1.3+ds-2
9.1.3+ds-3
9.1.4+ds-1
9.2.0+ds-1~deb12u1
9.2.0+ds-1
9.2.0+ds-2
9.2.1+ds-1
9.2.2+ds-1
9.2.3+ds-1
9.2.4+ds-1
9.2.4+ds-2
9.2.5+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-58136.json"

Debian:12 / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/debian/trafficserver?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.2.5+ds-0+deb12u4

Affected versions

9.*
9.2.0+ds-2
9.2.0+ds-2+deb12u1
9.2.1+ds-1
9.2.2+ds-1
9.2.3+ds-1
9.2.3+ds-1+deb12u1
9.2.4+ds-0+deb12u1
9.2.4+ds-1
9.2.4+ds-2
9.2.5+ds-0+deb12u1
9.2.5+ds-0+deb12u2
9.2.5+ds-0+deb12u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-58136.json"