Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Jan 2022 23:17:40 GMT
From:      "Danilo G. Baio" <dbaio@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 40a8623e2577 - main - security/vuxml: Document varnish cache vulnerability
Message-ID:  <202201292317.20TNHeiW008734@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by dbaio:

URL: https://cgit.FreeBSD.org/ports/commit/?id=40a8623e257711265e62046094e89686ebd272a8

commit 40a8623e257711265e62046094e89686ebd272a8
Author:     Danilo G. Baio <dbaio@FreeBSD.org>
AuthorDate: 2022-01-29 23:07:55 +0000
Commit:     Danilo G. Baio <dbaio@FreeBSD.org>
CommitDate: 2022-01-29 23:17:04 +0000

    security/vuxml: Document varnish cache vulnerability
    
    PR:             261562
    Security:       CVE-2022-23959
---
 security/vuxml/vuln-2022.xml | 35 +++++++++++++++++++++++++++++++++++
 1 file changed, 35 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 9337a4faab3e..a65f8ba1a1e1 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,38 @@
+  <vuln vid="b0c83e1a-8153-11ec-84f9-641c67a117d8">
+    <topic>varnish -- Request Smuggling Vulnerability</topic>
+    <affects>
+      <package>
+	<name>varnish6</name>
+	<range><lt>6.6.2</lt></range>
+      </package>
+      <package>
+	<name>varnish4</name>
+	<range><lt>4.1.11r6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Varnish Cache Project reports:</p>
+	<blockquote cite="https://varnish-cache.org/security/VSV00008.html">;
+	  <p>A request smuggling attack can be performed on HTTP/1 connections on
+	    Varnish Cache servers. The smuggled request would be treated as an additional
+	    request by the Varnish server, go through normal VCL processing, and injected
+	    as a spurious response on the client connection.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-23959</cvename>
+      <url>https://varnish-cache.org/security/VSV00008.html</url>;
+      <url>https://docs.varnish-software.com/security/VSV00008/</url>;
+      <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23959</url>;
+    </references>
+    <dates>
+      <discovery>2022-01-25</discovery>
+      <entry>2022-01-29</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b6ef8a53-8062-11ec-9af3-fb232efe4d2e">
     <topic>OpenEXR -- Heap-buffer-overflow in Imf_3_1::LineCompositeTask::execute</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202201292317.20TNHeiW008734>