Lucene search

K
mageiaGentoo FoundationMGASA-2021-0387
HistoryJul 28, 2021 - 11:00 p.m.

Updated varnish packages fix a security vulnerability

2021-07-2823:00:51
Gentoo Foundation
advisories.mageia.org
28

0.005 Low

EPSS

Percentile

75.6%

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8 (CVE-2021-36740).

OSVersionArchitecturePackageVersionFilename
Mageia8noarchvarnish< 6.5.1-1.1varnish-6.5.1-1.1.mga8