git: 6326090098b5 - main - security/vuxml: Add Varnish Cache vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 22 Mar 2025 12:11:19 UTC
The branch main has been updated by dbaio: URL: https://cgit.FreeBSD.org/ports/commit/?id=6326090098b541bb1368c23510e2539419ed4b80 commit 6326090098b541bb1368c23510e2539419ed4b80 Author: Danilo G. Baio <dbaio@FreeBSD.org> AuthorDate: 2025-03-22 12:02:36 +0000 Commit: Danilo G. Baio <dbaio@FreeBSD.org> CommitDate: 2025-03-22 12:06:16 +0000 security/vuxml: Add Varnish Cache vulnerability --- security/vuxml/vuln/2025.xml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 726f369d82f7..d068beacc59c 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,31 @@ + <vuln vid="26f6733d-06a9-11f0-ba0b-641c67a117d8"> + <topic>www/varnish7 -- client-side desync vulnerability</topic> + <affects> + <package> + <name>varnish7</name> + <range><lt>7.6.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Varnish Development Team reports:</p> + <blockquote cite="https://varnish-cache.org/security/VSV00015.html#vsv00015"> + <p>A client-side desync vulnerability can be triggered in Varnish Cache + and Varnish Enterprise. This vulnerability can be triggered under + specific circumstances involving malformed HTTP/1 requests.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-30346</cvename> + <url>https://varnish-cache.org/security/VSV00015.html#vsv00015</url> + </references> + <dates> + <discovery>2024-12-17</discovery> + <entry>2025-03-22</entry> + </dates> + </vuln> + <vuln vid="9456d4e9-055f-11f0-85f3-a8a1599412c6"> <topic>chromium -- multiple security fixes</topic> <affects>