Source: trafficserver
Version: 9.2.4+ds-2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 9.2.4+ds-0+deb12u1
Control: found -1 8.1.10+ds-1~deb11u1

Hi,

The following vulnerabilities were published for trafficserver.

CVE-2023-38522[0]:
| Incomplete field name check allows request smuggling


CVE-2024-35161[1]:
| Incomplete check for chunked trailer section allows request smuggling


CVE-2024-35296[2]:
| Invalid Accept-Encoding can force forwarding requests


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-38522
    https://www.cve.org/CVERecord?id=CVE-2023-38522
[1] https://security-tracker.debian.org/tracker/CVE-2024-35161
    https://www.cve.org/CVERecord?id=CVE-2024-35161
[2] https://security-tracker.debian.org/tracker/CVE-2024-35296
    https://www.cve.org/CVERecord?id=CVE-2024-35296
[3] https://www.openwall.com/lists/oss-security/2024/07/25/1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to