摘要:
trafficserver security update
安全等级: Medium
公告ID: KylinSec-SA-2025-2449
发布日期: 2025年3月14日
Apache Traffic Server is an OpenSource HTTP / HTTPS / HTTP/2 / QUIC reverse, forward and transparent proxy and cache.
Security Fix(es):
Improper Input Validation vulnerability in Apache Traffic Server.
This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.
Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.(CVE-2024-38311)
Improper Access Control vulnerability in Apache Traffic Server.
This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.
Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.(CVE-2024-56195)
Expected Behavior Violation vulnerability in Apache Traffic Server.
This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.
Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.(CVE-2024-56202)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-56195 | V6 | trafficserver | Fixed |
CVE-2024-38311 | V6 | trafficserver | Fixed |
CVE-2024-56202 | V6 | trafficserver | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
trafficserver | x86_64 | 9.2.5-5.ks6.kb1 |
trafficserver-devel | x86_64 | 9.2.5-5.ks6.kb1 |
trafficserver-perl | x86_64 | 9.2.5-5.ks6.kb1 |
trafficserver | aarch64 | 9.2.5-5.ks6.kb1 |
trafficserver-devel | aarch64 | 9.2.5-5.ks6.kb1 |
trafficserver-perl | aarch64 | 9.2.5-5.ks6.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名