An update for trafficserver is now available for openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1972 Final 1.0 1.0 2023-12-22 Initial 2023-12-22 2023-12-22 openEuler SA Tool V1.0 2023-12-22 trafficserver security update An update for trafficserver is now available for openEuler-20.03-LTS-SP1. Apache Traffic Server is an OpenSource HTTP / HTTPS / HTTP/2 / QUIC reverse, forward and transparent proxy and cache. Security Fix(es): Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0. (CVE-2022-47184) Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions (CVE-2023-33933) An update for trafficserver is now available for openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High trafficserver https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1972 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-47184 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-33933 https://nvd.nist.gov/vuln/detail/CVE-2022-47184 https://nvd.nist.gov/vuln/detail/CVE-2023-33933 openEuler-20.03-LTS-SP1 trafficserver-debugsource-9.1.4-2.oe1.aarch64.rpm trafficserver-debuginfo-9.1.4-2.oe1.aarch64.rpm trafficserver-perl-9.1.4-2.oe1.aarch64.rpm trafficserver-devel-9.1.4-2.oe1.aarch64.rpm trafficserver-9.1.4-2.oe1.aarch64.rpm trafficserver-9.1.4-2.oe1.src.rpm trafficserver-perl-9.1.4-2.oe1.x86_64.rpm trafficserver-debugsource-9.1.4-2.oe1.x86_64.rpm trafficserver-devel-9.1.4-2.oe1.x86_64.rpm trafficserver-debuginfo-9.1.4-2.oe1.x86_64.rpm trafficserver-9.1.4-2.oe1.x86_64.rpm Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0. 2023-12-22 CVE-2022-47184 openEuler-20.03-LTS-SP1 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N trafficserver security update 2023-12-22 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1972 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.8.x users should upgrade to 8.1.7 or later versions9.x users should upgrade to 9.2.1 or later versions 2023-12-22 CVE-2023-33933 openEuler-20.03-LTS-SP1 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N trafficserver security update 2023-12-22 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1972