{"id":"MGASA-2022-0434","summary":"Updated varnish packages fix security vulnerability","details":"An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x\nbefore 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may\nintroduce characters through HTTP/2 pseudo-headers that are invalid in the\ncontext of an HTTP/1 request line, causing the Varnish server to produce\ninvalid HTTP/1 requests to the backend. This could, in turn, be used to\nexploit vulnerabilities in a server behind the Varnish server.\n(CVE-2022-45060)\n","modified":"2026-01-31T16:43:47.647496Z","published":"2022-11-18T22:50:51Z","related":["CVE-2022-45060"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0434.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31121"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJFEBVAZE52U2TMYLTOEW3F7YGVD7XQL/"},{"type":"REPORT","url":"https://docs.varnish-software.com/security/VSV00011/"}],"affected":[{"package":{"name":"varnish","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/varnish?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.5.1-1.3.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0434.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}