git: 40a8623e2577 - main - security/vuxml: Document varnish cache vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 29 Jan 2022 23:17:40 UTC
The branch main has been updated by dbaio:
URL: https://cgit.FreeBSD.org/ports/commit/?id=40a8623e257711265e62046094e89686ebd272a8
commit 40a8623e257711265e62046094e89686ebd272a8
Author: Danilo G. Baio <dbaio@FreeBSD.org>
AuthorDate: 2022-01-29 23:07:55 +0000
Commit: Danilo G. Baio <dbaio@FreeBSD.org>
CommitDate: 2022-01-29 23:17:04 +0000
security/vuxml: Document varnish cache vulnerability
PR: 261562
Security: CVE-2022-23959
---
security/vuxml/vuln-2022.xml | 35 +++++++++++++++++++++++++++++++++++
1 file changed, 35 insertions(+)
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 9337a4faab3e..a65f8ba1a1e1 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,38 @@
+ <vuln vid="b0c83e1a-8153-11ec-84f9-641c67a117d8">
+ <topic>varnish -- Request Smuggling Vulnerability</topic>
+ <affects>
+ <package>
+ <name>varnish6</name>
+ <range><lt>6.6.2</lt></range>
+ </package>
+ <package>
+ <name>varnish4</name>
+ <range><lt>4.1.11r6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Varnish Cache Project reports:</p>
+ <blockquote cite="https://varnish-cache.org/security/VSV00008.html">
+ <p>A request smuggling attack can be performed on HTTP/1 connections on
+ Varnish Cache servers. The smuggled request would be treated as an additional
+ request by the Varnish server, go through normal VCL processing, and injected
+ as a spurious response on the client connection.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2022-23959</cvename>
+ <url>https://varnish-cache.org/security/VSV00008.html</url>
+ <url>https://docs.varnish-software.com/security/VSV00008/</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23959</url>
+ </references>
+ <dates>
+ <discovery>2022-01-25</discovery>
+ <entry>2022-01-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b6ef8a53-8062-11ec-9af3-fb232efe4d2e">
<topic>OpenEXR -- Heap-buffer-overflow in Imf_3_1::LineCompositeTask::execute</topic>
<affects>