Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5334-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5334-1 - Martin van Kervel Smedshammer discovered that varnish, a state of the art, high-performance web accelerator, is prone to a HTTP/2 request forgery vulnerability.
- systems | linux[9], debian[10]
- advisories | CVE-2022-45060[11]
- SHA-256 |
252078af082c9fffe4f816b645478a49bd303397f4456b2a82cf40274f3aa196
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5334-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Salvatore Bonaccorso
January 29, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : varnish
CVE ID : CVE-2022-45060
Debian Bug : 1023751
Martin van Kervel Smedshammer discovered that varnish, a state of the
art, high-performance web accelerator, is prone to a HTTP/2 request
forgery vulnerability.
See https://varnish-cache.org/security/VSV00011.html for details.
For the stable distribution (bullseye), this problem has been fixed in
version 6.5.1-1+deb11u3.
We recommend that you upgrade your varnish packages.
For the detailed security status of varnish please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/varnish
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=wFUO
-----END PGP SIGNATURE-----
File Tags
- ActiveX[21] (932)
- Advisory[22] (80,062)
- Arbitrary[23] (15,762)
- BBS[24] (2,859)
- Bypass[25] (1,644)
- CGI[26] (1,020)
- Code Execution[27] (6,966)
- Conference[28] (675)
- Cracker[29] (840)
- CSRF[30] (3,294)
- DoS[31] (22,717)
- Encryption[32] (2,354)
- Exploit[33] (50,512)
- File Inclusion[34] (4,172)
- File Upload[35] (948)
- Firewall[36] (821)
- Info Disclosure[37] (2,674)
- Intrusion Detection[38] (869)
- Java[39] (2,945)
- JavaScript[40] (826)
- Kernel[41] (6,347)
- Local[42] (14,229)
- Magazine[43] (586)
- Overflow[44] (12,461)
- Perl[45] (1,418)
- PHP[46] (5,099)
- Proof of Concept[47] (2,293)
- Protocol[48] (3,444)
- Python[49] (1,469)
- Remote[50] (30,132)
- Root[51] (3,517)
- Rootkit[52] (501)
- Ruby[53] (597)
- Scanner[54] (1,633)
- Security Tool[55] (7,801)
- Shell[56] (3,114)
- Shellcode[57] (1,206)
- Sniffer[58] (889)
- Spoof[59] (2,174)
- SQL Injection[60] (16,137)
- TCP[61] (2,382)
- Trojan[62] (686)
- UDP[63] (878)
- Virus[64] (662)
- Vulnerability[65] (31,226)
- Web[66] (9,401)
- Whitepaper[67] (3,736)
- x86[68] (946)
- XSS[69] (17,524)
- Other[70]
File Archives
- January 2023[71]
- December 2022[72]
- November 2022[73]
- October 2022[74]
- September 2022[75]
- August 2022[76]
- July 2022[77]
- June 2022[78]
- May 2022[79]
- April 2022[80]
- March 2022[81]
- February 2022[82]
- Older[83]
Systems
- AIX[84] (426)
- Apple[85] (1,945)
- BSD[86] (370)
- CentOS[87] (55)
- Cisco[88] (1,917)
- Debian[89] (6,667)
- Fedora[90] (1,690)
- FreeBSD[91] (1,242)
- Gentoo[92] (4,288)
- HPUX[93] (878)
- iOS[94] (337)
- iPhone[95] (108)
- IRIX[96] (220)
- Juniper[97] (67)
- Linux[98] (44,609)
- Mac OS X[99] (684)
- Mandriva[100] (3,105)
- NetBSD[101] (255)
- OpenBSD[102] (479)
- RedHat[103] (12,639)
- Slackware[104] (941)
- Solaris[105] (1,609)
- SUSE[106] (1,444)
- Ubuntu[107] (8,266)
- UNIX[108] (9,184)
- UnixWare[109] (185)
- Windows[110] (6,519)
- Other[111]
Read more https://packetstormsecurity.com/files/170793/dsa-5334-1.txt