Name | CVE-2019-17559 |
Description | There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and scheme parsing. Upgrade to versions 7.1.9 and 8.0.6 or later versions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4672-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
trafficserver (PTS) | bullseye | 8.1.10+ds-1~deb11u1 | fixed |
bullseye (security) | 8.1.11+ds-0+deb11u1 | fixed | |
bookworm, bookworm (security) | 9.2.5+ds-0+deb12u1 | fixed | |
sid | 9.2.5+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
trafficserver | source | buster | 8.0.2+ds-1+deb10u2 | DSA-4672-1 | ||
trafficserver | source | (unstable) | 8.0.6+ds-1 |
https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E