Описание
ELSA-2022-8649: varnish:6 security update (IMPORTANT)
varnish [6.0.8-2.1]
- Resolves: #2142092 - CVE-2022-45060 varnish:6/varnish: Request Forgery Vulnerability
[6.0.8-2]
- Resolves: #2047650 - CVE-2022-23959 varnish:6/varnish: Varnish HTTP/1 Request Smuggling Vulnerability
varnish-modules [0.15.0-6]
- Related: #1982862 - rebuild for new varnish version
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module varnish:6 is enabled
varnish
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-devel
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-docs
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-modules
0.15.0-6.module+el8.5.0+20320+0b4af72d
Oracle Linux x86_64
Module varnish:6 is enabled
varnish
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-devel
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-docs
6.0.8-2.module+el8.7.0+20885+cb213da4.1
varnish-modules
0.15.0-6.module+el8.5.0+20320+0b4af72d
Связанные CVE
Связанные уязвимости
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and ...