SB20250704134 - openEuler 24.03 LTS update for trafficserver



SB20250704134 - openEuler 24.03 LTS update for trafficserver

Published: July 4, 2025

Security Bulletin ID SB20250704134
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2025-31698)

The vulnerability allows a remote attacker to bypass implemented IP-based ACLs.

The vulnerability exists due to application does not apply IP-based ACL on requests sent with PROXY HTTP method. A remote attacker can bypass implemented filtration and gain unauthorized access to the application. 


2) Resource exhaustion (CVE-ID: CVE-2025-49763)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in ESI Plugin. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.