stable

trafficserver-9.2.3-1.el7

FEDORA-EPEL-2023-d499e96867 created by jered a year ago for Fedora EPEL 7

Update to upstream 9.2.3 Resolves CVE-2023-44487, CVE-2023-41752, CVE-2023-39456


Use OpenSSL 1.1.x from EPEL on EL7 to enable TLSv1.3 and enable Chrome 117+ workaround

This update has been submitted for testing by jered.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has obsoleted trafficserver-9.2.2-2.el7, and has inherited its bugs and notes.

a year ago

This update has been pushed to testing.

a year ago

This update has been submitted for stable by bodhi.

a year ago

jered edited this update.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
modified
a year ago
approved
a year ago
BZ#2242988 trafficserver-9.2.3-rc0 is available
0
0
BZ#2243251 [Major Incident] CVE-2023-44487 trafficserver: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [epel-all]
0
0
BZ#2243252 [Major Incident] CVE-2023-44487 trafficserver: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [fedora-all]
0
0
BZ#2245107 CVE-2023-39456 trafficserver: improper input validation vulnerability [epel-all]
0
0
BZ#2245110 CVE-2023-39456 trafficserver: improper input validation vulnerability [fedora-all]
0
0
BZ#2245141 CVE-2023-41752 trafficserver: possible exposure of sensitive information [epel-all]
0
0
BZ#2245142 CVE-2023-41752 trafficserver: possible exposure of sensitive information [fedora-all]
0
0

Automated Test Results