First published: Thu Aug 11 2022(Updated: )
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Varnish Cache Project Varnish Cache | =7.0.0 | |
Varnish Cache Project Varnish Cache | =7.0.1 | |
Varnish Cache Project Varnish Cache | =7.0.2 | |
Varnish Cache Project Varnish Cache | =7.1.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38150 is a vulnerability in Varnish Cache versions 7.0.0, 7.0.1, 7.0.2, and 7.1.0 that allows an attacker to cause the server to assert and automatically restart through forged HTTP/1 backend responses.
CVE-2022-38150 affects Varnish Cache versions 7.0.0, 7.0.1, 7.0.2, and 7.1.0.
The severity of CVE-2022-38150 is high with a severity score of 7.5.
To fix CVE-2022-38150, you should upgrade to Varnish Cache version 7.0.3 or 7.1.1, as this vulnerability is fixed in these versions.
You can find more information about CVE-2022-38150 at the following references: [Reference 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3X4PEKC5C736SCKE2UG3Y7JWKMD2K6/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2BUKFICLZBXESLQ3MXMIG3G52RZURFK/)