This bug was fixed in the package varnish - 6.2.1-2ubuntu0.1 --------------- varnish (6.2.1-2ubuntu0.1) focal-security; urgency=medium
* SECURITY UPDATE: Sensitive Information Disclosure - debian/patches/CVE-2019-20637.patch: Clear err_code and err_reason at start of request handling. (LP: #1971504, LP: #1939281) CVE-2019-20637 * SECURITY UPDATE: Assertion failure - debian/patches/CVE-2020-11653.patch: Take sizeof pool_task into account when reserving WS in SES_Wait. (LP: #1971504, LP: #1939281) CVE-2020-11653 * SECURITY UPDATE: HTTP Request Smuggling - debian/patches/CVE-2021-36740.patch: Take content length into account on H/2 request bodies. (LP: #1971504, LP: #1939281) - debian/patches/CVE-2022-23959.patch: Mark req doclose when failing to ignore req body. (LP: #1971504, LP: #1939281) CVE-2021-36740 CVE-2022-23959 * Additions fixes - debian/patches/WS_ReserveAll.patch: Add WS_ReserveAll to replace WS_Reserve(ws, 0). - debian/patches/WS_ReserveSize.patch: Deprecate WS_Reserve() and replace it with WS_ReserveSize(). -- Luís Infante da Câmara <luis.infante.da.cam...@tecnico.ulisboa.pt> Wed, 04 May 2022 21:16:37 +0100 ** Changed in: varnish (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-20637 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-11653 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23959 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1939281 Title: Please provide update for CVE-2021-36740 (VSV00007 Varnish HTTP/2 Request Smuggling Attack) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/varnish/+bug/1939281/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs