First published: Tue Oct 17 2023(Updated: )
Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 9.2.3, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=9.0.0<9.2.3 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u3 8.1.7+ds-1~deb11u1 8.1.9+ds-1~deb11u1 9.2.3+ds-1+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-39456.
CVE-2023-39456 has a severity level of 7.5 (High).
Apache Traffic Server versions 9.0.0 through 9.2.2 are affected by CVE-2023-39456.
Upgrade to Apache Traffic Server version 9.2.3, which includes the fix for CVE-2023-39456.
Yes, you can find more information about CVE-2023-39456 at the following references: [Reference 1](https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/).