Apache Traffic Server is an OpenSource HTTP / HTTPS / HTTP/2 / QUIC reverse, forward and transparent proxy and cache.
Security Fix(es):
Improper Input Validation vulnerability in HTTP/2 header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.(CVE-2022-31779)
{
"severity": "High"
}{
"x86_64": [
"trafficserver-debugsource-9.1.3-1.oe1.x86_64.rpm",
"trafficserver-devel-9.1.3-1.oe1.x86_64.rpm",
"trafficserver-debuginfo-9.1.3-1.oe1.x86_64.rpm",
"trafficserver-9.1.3-1.oe1.x86_64.rpm",
"trafficserver-perl-9.1.3-1.oe1.x86_64.rpm"
],
"aarch64": [
"trafficserver-debuginfo-9.1.3-1.oe1.aarch64.rpm",
"trafficserver-perl-9.1.3-1.oe1.aarch64.rpm",
"trafficserver-debugsource-9.1.3-1.oe1.aarch64.rpm",
"trafficserver-devel-9.1.3-1.oe1.aarch64.rpm",
"trafficserver-9.1.3-1.oe1.aarch64.rpm"
],
"src": [
"trafficserver-9.1.3-1.oe1.src.rpm"
]
}