DEBIAN-CVE-2022-23959

Source
https://security-tracker.debian.org/tracker/CVE-2022-23959
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-23959.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-23959
Upstream
Published
2022-01-26T01:15:07Z
Modified
2025-09-25T23:27:16.863657Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.

References

Affected packages

Debian:11 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.1-1+deb11u2

Affected versions

6.*

6.5.1-1
6.5.1-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.0-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.0-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / varnish

Package

Name
varnish
Purl
pkg:deb/debian/varnish?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.0-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}