CVE-2024-38479

NameCVE-2024-38479
DescriptionImproper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1087531

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
trafficserver (PTS)buster (security), buster, buster (lts)8.1.7-0+deb10u4vulnerable
bullseye8.1.10+ds-1~deb11u1vulnerable
bullseye (security)8.1.11+ds-0+deb11u1vulnerable
bookworm (security), bookworm9.2.5+ds-0+deb12u1vulnerable
sid9.2.5+ds-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
trafficserversourcebuster(unfixed)end-of-life
trafficserversource(unstable)(unfixed)1087531

Notes

https://www.openwall.com/lists/oss-security/2024/11/13/1
https://github.com/apache/trafficserver/pull/11856
https://github.com/apache/trafficserver/commit/b8861231702ac5df7d5de401e82440c1cf20b633 (9.2.6-rc0)

Search for package or bug name: Reporting problems