http://bugzilla.opensuse.org/show_bug.cgi?id=1205242 Bug ID: 1205242 Summary: VUL-0: CVE-2022-45060: varnish: HTTP request forgery via character injection through HTTP/2 pseudo-headers Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other URL: https://smash.suse.de/issue/347487/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: jengelh@inai.de Reporter: carlos.lopez@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2022-45060 An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45060 https://www.cve.org/CVERecord?id=CVE-2022-45060 https://docs.varnish-software.com/security/VSV00011 https://varnish-cache.org/security/VSV00011.html -- You are receiving this mail because: You are on the CC list for the bug.