UBUNTU-CVE-2024-30156

Source
https://ubuntu.com/security/CVE-2024-30156
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-30156.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-30156
Related
Published
2024-03-24T01:15:00Z
Modified
2025-03-24T04:41:32Z
Summary
[none]
Details

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

References

Affected packages

Ubuntu:22.04:LTS / varnish

Package

Name
varnish
Purl
pkg:deb/ubuntu/varnish@6.6.1-1ubuntu0.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.2-1
6.6.1-1
6.6.1-1ubuntu0.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / varnish

Package

Name
varnish
Purl
pkg:deb/ubuntu/varnish@7.1.1-1.1ubuntu1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.1.1-1.1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}