An update for trafficserver is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-2166
Final
1.0
1.0
2022-12-30
Initial
2022-12-30
2022-12-30
openEuler SA Tool V1.0
2022-12-30
trafficserver security update
An update for trafficserver is now available for openEuler-20.03-LTS-SP1.
Apache Traffic Server is an OpenSource HTTP / HTTPS / HTTP/2 / QUIC reverse,forward and transparent proxy and cache.
Security Fix(es):
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.(CVE-2022-32749)
Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.(CVE-2022-37392)
Improper Input Validation vulnerability for the xdebug plugin in Apache Software Foundation Apache Traffic Server can lead to cross site scripting and cache poisoning attacks.This issue affects Apache Traffic Server: 9.0.0 to 9.1.3. Users should upgrade to 9.1.4 or later versions.(CVE-2022-40743)
An update for trafficserver is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
trafficserver
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2166
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-32749
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-37392
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-40743
https://nvd.nist.gov/vuln/detail/CVE-2022-32749
https://nvd.nist.gov/vuln/detail/CVE-2022-37392
https://nvd.nist.gov/vuln/detail/CVE-2022-40743
openEuler-20.03-LTS-SP1
trafficserver-devel-9.1.4-1.oe1.aarch64.rpm
trafficserver-debuginfo-9.1.4-1.oe1.aarch64.rpm
trafficserver-perl-9.1.4-1.oe1.aarch64.rpm
trafficserver-9.1.4-1.oe1.aarch64.rpm
trafficserver-debugsource-9.1.4-1.oe1.aarch64.rpm
trafficserver-9.1.4-1.oe1.src.rpm
trafficserver-debuginfo-9.1.4-1.oe1.x86_64.rpm
trafficserver-9.1.4-1.oe1.x86_64.rpm
trafficserver-devel-9.1.4-1.oe1.x86_64.rpm
trafficserver-perl-9.1.4-1.oe1.x86_64.rpm
trafficserver-debugsource-9.1.4-1.oe1.x86_64.rpm
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.
2022-12-30
CVE-2022-32749
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
trafficserver security update
2022-12-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2166
Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
2022-12-30
CVE-2022-37392
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
trafficserver security update
2022-12-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2166
Improper Input Validation vulnerability for the xdebug plugin in Apache Software Foundation Apache Traffic Server can lead to cross site scripting and cache poisoning attacks.This issue affects Apache Traffic Server: 9.0.0 to 9.1.3. Users should upgrade to 9.1.4 or later versions.
2022-12-30
CVE-2022-40743
openEuler-20.03-LTS-SP1
Medium
6.1
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
trafficserver security update
2022-12-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2166