CVE-2022-38150

NameCVE-2022-38150
DescriptionIn Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
varnish (PTS)jessie, jessie (lts)4.0.2-1+deb8u1fixed
stretch (security), stretch (lts), stretch5.0.0-7+deb9u3fixed
buster (security), buster, buster (lts)6.1.1-1+deb10u4fixed
bullseye (security), bullseye6.5.1-1+deb11u3fixed
bookworm7.1.1-1.1fixed
sid, trixie7.6.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
varnishsourcejessie(not affected)
varnishsourcestretch(not affected)
varnishsourcebuster(not affected)
varnishsourcebullseye(not affected)
varnishsource(unstable)7.1.1-1

Notes

[bullseye] - varnish <not-affected> (Vulnerable code not present)
[buster] - varnish <not-affected> (Vulnerable code not present)
https://varnish-cache.org/security/VSV00009.html
Introduced by: https://github.com/varnishcache/varnish-cache/commit/f4dffe593b04a33f07423db3f9dc69eb428b2e85 (varnish-7.0.0)
Fixed by: https://github.com/varnishcache/varnish-cache/commit/c5fd097e5cce8b461c6443af02b3448baef2491d (master)
Fixed by: https://github.com/varnishcache/varnish-cache/commit/19544fdc6649bd294f25314d9f609b4979b1fe48 (varnish-7.1.1)
[stretch] - varnish <not-affected> (Vulnerable code not present)
[jessie] - varnish <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems