It was dicovered that Varnish Cache did not clear a pointer between the
handling of one client request and the next request within the same connection.
A remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2019-20637)
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart the daemon and cause a performance loss.
(CVE-2020-11653)
It was discovered that Varnish Cache allowed request smuggling and VCL
authorization bypass via a large Content-Length header for a POST
request. A remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2021-36740)
It was discovered that Varnish Cache allowed request smuggling for HTTP/1
connections. A remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-23959)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | varnish | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | libvarnishapi-dev | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | libvarnishapi2 | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | libvarnishapi2-dbgsym | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | varnish-dbgsym | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | varnish-doc | <Â 6.6.1-1ubuntu0.2 | UNKNOWN |
Ubuntu | 21.10 | noarch | varnish | <Â 6.5.2-1ubuntu0.2 | UNKNOWN |
Ubuntu | 21.10 | noarch | libvarnishapi-dev | <Â 6.5.2-1ubuntu0.2 | UNKNOWN |
Ubuntu | 21.10 | noarch | libvarnishapi2 | <Â 6.5.2-1ubuntu0.2 | UNKNOWN |
Ubuntu | 21.10 | noarch | libvarnishapi2-dbgsym | <Â 6.5.2-1ubuntu0.2 | UNKNOWN |