DLA-3279-1

Source
https://storage.googleapis.com/debian-osv/dla-osv/DLA-3279-1.json
Aliases
Published
2023-01-23T00:00:00Z
Modified
2023-01-23T12:18:31.693664Z
Details

Multiple vulnerabilities were found in trafficserver, a caching proxy server.

  • CVE-2021-37150 Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources
  • CVE-2022-25763 Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks.
  • CVE-2022-28129 Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers
  • CVE-2022-31780 Improper Input Validation vulnerability in HTTP/2 frame handling of Apache Traffic Server allows an attacker to smuggle requests.

For Debian 10 buster, these problems have been fixed in version 8.0.2+ds-1+deb10u7.

We recommend that you upgrade your trafficserver packages.

For the detailed security status of trafficserver please refer to its security tracker page at: https://security-tracker.debian.org/tracker/trafficserver

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

References

Affected packages

Debian:10 / trafficserver

trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
8.0.2+ds-1+deb10u7

Affected versions

8.*

8.0.2+ds-1
8.0.2+ds-1+deb10u1
8.0.2+ds-1+deb10u2
8.0.2+ds-1+deb10u3
8.0.2+ds-1+deb10u4
8.0.2+ds-1+deb10u5
8.0.2+ds-1+deb10u6