Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5311-1

Debian Linux Security Advisory 5311-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling, cache poisoning or denial of service.

Packet Storm
#vulnerability#ios#linux#debian#dos#apache#nodejs
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5311-1                   [email protected]://www.debian.org/security/                       Moritz MuehlenhoffJanuary 08, 2023                      https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : trafficserverCVE ID         : CVE-2022-32749 CVE-2022-37392Several vulnerabilities were discovered in Apache Traffic Server, areverse and forward proxy server, which could result in HTTP requestsmuggling, cache poisoning or denial of service.For the stable distribution (bullseye), these problems have been fixed inversion 8.1.6+ds-1~deb11u1.We recommend that you upgrade your trafficserver packages.For the detailed security status of trafficserver please refer toits security tracker page at:https://security-tracker.debian.org/tracker/trafficserverFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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LHcX-----END PGP SIGNATURE-----

Related news

CVE-2022-37392

Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.

Packet Storm: Latest News

WordPress Really Simple Security Authentication Bypass