Date: Sat, 29 Jan 2022 23:17:40 GMT From: "Danilo G. Baio" <dbaio@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 40a8623e2577 - main - security/vuxml: Document varnish cache vulnerability Message-ID: <202201292317.20TNHeiW008734@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by dbaio: URL: https://cgit.FreeBSD.org/ports/commit/?id=40a8623e257711265e62046094e89686ebd272a8 commit 40a8623e257711265e62046094e89686ebd272a8 Author: Danilo G. Baio <dbaio@FreeBSD.org> AuthorDate: 2022-01-29 23:07:55 +0000 Commit: Danilo G. Baio <dbaio@FreeBSD.org> CommitDate: 2022-01-29 23:17:04 +0000 security/vuxml: Document varnish cache vulnerability PR: 261562 Security: CVE-2022-23959 --- security/vuxml/vuln-2022.xml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 9337a4faab3e..a65f8ba1a1e1 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,38 @@ + <vuln vid="b0c83e1a-8153-11ec-84f9-641c67a117d8"> + <topic>varnish -- Request Smuggling Vulnerability</topic> + <affects> + <package> + <name>varnish6</name> + <range><lt>6.6.2</lt></range> + </package> + <package> + <name>varnish4</name> + <range><lt>4.1.11r6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Varnish Cache Project reports:</p> + <blockquote cite="https://varnish-cache.org/security/VSV00008.html"> + <p>A request smuggling attack can be performed on HTTP/1 connections on + Varnish Cache servers. The smuggled request would be treated as an additional + request by the Varnish server, go through normal VCL processing, and injected + as a spurious response on the client connection.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-23959</cvename> + <url>https://varnish-cache.org/security/VSV00008.html</url> + <url>https://docs.varnish-software.com/security/VSV00008/</url> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23959</url> + </references> + <dates> + <discovery>2022-01-25</discovery> + <entry>2022-01-29</entry> + </dates> + </vuln> + <vuln vid="b6ef8a53-8062-11ec-9af3-fb232efe4d2e"> <topic>OpenEXR -- Heap-buffer-overflow in Imf_3_1::LineCompositeTask::execute</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202201292317.20TNHeiW008734>