| Name | CVE-2026-40560 |
| Description | Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1135229 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| starman (PTS) | bullseye | 0.4015-1 | vulnerable |
| bookworm | 0.4016-1 | vulnerable |
| forky, sid, trixie | 0.4017-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| starman | source | (unstable) | (unfixed) | | | 1135229 |
Notes
[trixie] - starman <no-dsa> (Minor issue; can be fixed via point release)
[bookworm] - starman <no-dsa> (Minor issue; can be fixed via point release)
https://lists.security.metacpan.org/cve-announce/msg/39426182/
Fixed by: https://github.com/miyagawa/Starman/commit/ced205f0805027e9d9c0731f8c40b104220604ed (0.4018)