CVE-2022-23959

NameCVE-2022-23959
DescriptionIn Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2920-1, DSA-5088-1
Debian Bugs1004433

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
varnish (PTS)buster6.1.1-1+deb10u3fixed
buster (security)6.1.1-1+deb10u4fixed
bullseye (security), bullseye6.5.1-1+deb11u3fixed
bookworm7.1.1-1.1fixed
sid, trixie7.1.1-1.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
varnishsourcestretch5.0.0-7+deb9u3DLA-2920-1
varnishsourcebuster6.1.1-1+deb10u3DSA-5088-1
varnishsourcebullseye6.5.1-1+deb11u2DSA-5088-1
varnishsource(unstable)7.1.0-51004433

Notes

https://varnish-cache.org/security/VSV00008.html
https://docs.varnish-software.com/security/VSV00008/
Fixed by: https://github.com/varnishcache/varnish-cache/commit/fceaefd4d59a3b5d5a4903a3f420e35eb430d0d4 (master)
Fixed by: https://github.com/varnishcache/varnish-cache/commit/9ed39d1f796369caafb647fe37b729c07f332327 (6.6.2)
Test case: https://github.com/varnishcache/varnish-cache/commit/ec531e16b9cd139bbf8971c5b306561c669681f4 (6.6.2)

Search for package or bug name: Reporting problems