MGASA-2022-0434

Source
https://advisories.mageia.org/MGASA-2022-0434.html
Import Source
https://advisories.mageia.org/MGASA-2022-0434.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0434
Related
Published
2022-11-18T22:50:51Z
Modified
2022-11-18T21:50:14Z
Summary
Updated varnish packages fix security vulnerability
Details

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. (CVE-2022-45060)

References
Credits

Affected packages

Mageia:8 / varnish

Package

Name
varnish
Purl
pkg:rpm/mageia/varnish?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.1-1.3.mga8

Ecosystem specific

{
    "section": "core"
}