CVE-2022-23959

NameCVE-2022-23959
DescriptionIn Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2920-1, DSA-5088-1
NVD severitymedium
Debian Bugs1004433

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
varnish (PTS)stretch5.0.0-7+deb9u2vulnerable
stretch (security)5.0.0-7+deb9u3fixed
buster, buster (security)6.1.1-1+deb10u3fixed
bullseye (security), bullseye6.5.1-1+deb11u2fixed
sid6.6.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
varnishsourcestretch5.0.0-7+deb9u3DLA-2920-1
varnishsourcebuster6.1.1-1+deb10u3DSA-5088-1
varnishsourcebullseye6.5.1-1+deb11u2DSA-5088-1
varnishsource(unstable)(unfixed)1004433

Notes

https://varnish-cache.org/security/VSV00008.html
https://docs.varnish-software.com/security/VSV00008/
Fixed by: https://github.com/varnishcache/varnish-cache/commit/fceaefd4d59a3b5d5a4903a3f420e35eb430d0d4 (master)
Fixed by: https://github.com/varnishcache/varnish-cache/commit/9ed39d1f796369caafb647fe37b729c07f332327 (6.6.2)
Test case: https://github.com/varnishcache/varnish-cache/commit/ec531e16b9cd139bbf8971c5b306561c669681f4 (6.6.2)

Search for package or bug name: Reporting problems