Name | CVE-2022-23959 |
Description | In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2920-1, DSA-5088-1 |
Debian Bugs | 1004433 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
varnish (PTS) | jessie, jessie (lts) | 4.0.2-1+deb8u1 | vulnerable |
| stretch (security), stretch (lts), stretch | 5.0.0-7+deb9u3 | fixed |
| buster (security), buster, buster (lts) | 6.1.1-1+deb10u4 | fixed |
| bullseye (security), bullseye | 6.5.1-1+deb11u3 | fixed |
| bookworm | 7.1.1-1.1 | fixed |
| sid, trixie | 7.6.1-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://varnish-cache.org/security/VSV00008.html
https://docs.varnish-software.com/security/VSV00008/
Fixed by: https://github.com/varnishcache/varnish-cache/commit/fceaefd4d59a3b5d5a4903a3f420e35eb430d0d4 (master)
Fixed by: https://github.com/varnishcache/varnish-cache/commit/9ed39d1f796369caafb647fe37b729c07f332327 (6.6.2)
Test case: https://github.com/varnishcache/varnish-cache/commit/ec531e16b9cd139bbf8971c5b306561c669681f4 (6.6.2)
[jessie] - varnish <ignored> (disputed for 4.0.x and can't be tested, mitigation exists)
fixed in Varnish Cache Plus 4.1.11r6 which is private
VRB_Ignore() is derived/renamed from HTTP1_DiscardReqBody(), present in earlier versions (cf. 036bd79f6e6d851bef2af330b909ba769e0d9917)
4.0.x probably not-affected https://varnish-cache.org/lists/pipermail/varnish-misc/2022-March/027136.html
https://varnish-cache.org/security/VSV00008.html#mitigation