trafficserver is vulnerable to improper input validation. The vulnerability exists in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers.
lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
lists.debian.org/debian-lts-announce/2023/01/msg00019.html
lists.fedoraproject.org/archives/list/[email protected]/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
lists.fedoraproject.org/archives/list/[email protected]/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
security-tracker.debian.org/tracker/CVE-2022-28129
www.debian.org/security/2022/dsa-5206