CVE-2024-50306

NameCVE-2024-50306
DescriptionUnchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1087531

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
trafficserver (PTS)buster (security), buster, buster (lts)8.1.7-0+deb10u4vulnerable
bullseye8.1.10+ds-1~deb11u1vulnerable
bullseye (security)8.1.11+ds-0+deb11u1vulnerable
bookworm (security), bookworm9.2.5+ds-0+deb12u1vulnerable
sid9.2.5+ds-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
trafficserversourcebuster(unfixed)end-of-life
trafficserversource(unstable)(unfixed)1087531

Notes

https://www.openwall.com/lists/oss-security/2024/11/13/1
https://github.com/apache/trafficserver/pull/11855
Fixed by: https://github.com/apache/trafficserver/commit/27f504883547502b1f5e4e389edd7f26e3ab246f (9.2.6-rc0)
Fixed by: https://github.com/apache/trafficserver/commit/ae638096e259121d92d46a9f57026a5ff5bc328b (master)
Complemented by: https://github.com/apache/trafficserver/pull/11872
Followup: https://github.com/apache/trafficserver/commit/a0d49ddb44ea5e295c85d7d88a13e4978d6bc84b (9.2.7-rc0)
Followup: https://github.com/apache/trafficserver/commit/d4dda9b5583d19e2eee268fec59aa487d61fc079 (master)

Search for package or bug name: Reporting problems