DEBIAN-CVE-2021-36740

Source
https://security-tracker.debian.org/tracker/CVE-2021-36740
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-36740.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-36740
Upstream
Published
2021-07-14T17:15:08Z
Modified
2025-09-19T07:31:42.736350Z
Summary
[none]
Details

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

References

Affected packages

Debian:11 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.1-1+deb11u2

Affected versions

6.*

6.5.1-1
6.5.1-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}