it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5896-1] trafficserver security update
- Date: Sat, 5 Apr 2025 13:15:14 +0000
- Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
- List-archive: https://lists.debian.org/msgid-search/Z/Es4pyIPXFAlCqT AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=c0aTmMWERlxbr/K5zsA9y/QiJ48PzHkqUff6tmoXJsA=; b=oQ 1GgBdRS/vIHeluZrjGoWRkfEiWVRpBwj3WMKXOCAZBy9IYv9ft0bftcGDfV6R9LF56ELxqBanfWgM +dhWI3eHM5ri9jzQ7eswppun/eZzj1JWZb4D1Y6r85iy4a1zgLJM537Qtp1VHTs46hp8vZ1RsUOkR 7uHnSHeDTeo37YW2mb32f8w37EAEp3OyM/naP5ZDuo2UfYhkEAW82KhkbQgyBRbSjC7EwGnTpTbYm egdsRffqg+V57LW3+DafvQqYl9OHWJegVXOoyagYd7TQ5x8Y+sdJ2GvOf1LoKhAPqcE6QXstL8R7z Pg9lufnaKbuZrmNgiMor+rhyHxukBUwA==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Sat, 5 Apr 2025 13:15:34 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <4kVE6WzRcTH.A.6I0.2zS8nB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5896-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 05, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : trafficserver
CVE ID : CVE-2024-38311 CVE-2024-38479 CVE-2024-50305
CVE-2024-50306 CVE-2024-56195 CVE-2024-56202
Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in denial of
service, HTTP request smuggling, cache poisoning or incomplete
dropping of privileges.
For the stable distribution (bookworm), these problems have been fixed in
version 9.2.5+ds-0+deb12u2.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=j/9L
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5896-1] trafficserver security update, Moritz Muehlenhoff, 05.04.2025
Archiv bereitgestellt durch MHonArc 2.6.19+.