varnish:sid is vulnerable to Inconsistent Interpretation of HTTP Requests. An attacker could perform a smuggling attack by requesting certain headers to be made hop by hop on varnish servers which will not allow critical headers to be forwarded to the backend.
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/
lists.fedoraproject.org/archives/list/[email protected]/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/
lists.fedoraproject.org/archives/list/[email protected]/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/
lists.fedoraproject.org/archives/list/[email protected]/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/
security-tracker.debian.org/tracker/CVE-2022-45059
varnish-cache.org/security/VSV00010.html