Fedora 41: trafficserver 2024-f4dc07db08 Security Advisory Updates
Summary
Traffic Server is a high-performance building block for cloud services.
It's more than just a caching proxy server; it also has support for
plugins to build large scale web applications. Key features:
Caching - Improve your response time, while reducing server load and
bandwidth needs by caching and reusing frequently-requested web pages,
images, and web service calls.
Proxying - Easily add keep-alive, filter or anonymize content
requests, or add load balancing by adding a proxy layer.
Fast - Scales well on modern SMP hardware, handling 10s of thousands
of requests per second.
Extensible - APIs to write your own plug-ins to do anything from
modifying HTTP headers to handling ESI requests to writing your own
cache algorithm.
Proven - Handling over 400TB a day at Yahoo! both as forward and
reverse proxies, Apache Traffic Server is battle hardened.
Update Information:
Update to upstream 9.2.6 Backport fix for broken oubound TLS with OpenSSL 3.2+ Resolves CVE-2024-38479, CVE-2024-50305, CVE-2024-50306
Change Log
* Tue Nov 12 2024 Jered Floyd
References
[ 1 ] Bug #2326136 - trafficserver stopped working after upgrade from F39 to F40 - connection to backendserver is finished before data flows
https://bugzilla.redhat.com/show_bug.cgi?id=2326136
[ 2 ] Bug #2326236 - CVE-2024-50306 trafficserver: Apache Traffic Server: Server process can fail to drop privilege [fedora-41]
https://bugzilla.redhat.com/show_bug.cgi?id=2326236
[ 3 ] Bug #2326241 - CVE-2024-50305 trafficserver: Apache Traffic Server: Valid Host field value can cause crashes [fedora-41]
https://bugzilla.redhat.com/show_bug.cgi?id=2326241
[ 4 ] Bug #2326246 - CVE-2024-38479 trafficserver: Apache Traffic Server: Cache key plugin is vulnerable to cache poisoning attack [fedora-41]
https://bugzilla.redhat.com/show_bug.cgi?id=2326246
Update Instructions
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-f4dc07db08' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label