Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-8649

Опубликовано: 28 нояб. 2022
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2022-8649: varnish:6 security update (IMPORTANT)

varnish [6.0.8-2.1]

  • Resolves: #2142092 - CVE-2022-45060 varnish:6/varnish: Request Forgery Vulnerability

[6.0.8-2]

  • Resolves: #2047650 - CVE-2022-23959 varnish:6/varnish: Varnish HTTP/1 Request Smuggling Vulnerability

varnish-modules [0.15.0-6]

  • Related: #1982862 - rebuild for new varnish version

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

Module varnish:6 is enabled

varnish

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-devel

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-docs

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-modules

0.15.0-6.module+el8.5.0+20320+0b4af72d

Oracle Linux x86_64

Module varnish:6 is enabled

varnish

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-devel

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-docs

6.0.8-2.module+el8.7.0+20885+cb213da4.1

varnish-modules

0.15.0-6.module+el8.5.0+20320+0b4af72d

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS3: 7.5
redhat
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS3: 7.5
nvd
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS3: 7.5
debian
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and ...

rocky
больше 2 лет назад

Important: varnish:6 security update