Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0673: Red Hat Security Advisory: rh-varnish6-varnish security update

An update for rh-varnish6-varnish is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-45060: An HTTP Request Forgery issue was discovered in Varnish Cache. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could be used to exploit vulnerabilities in a server behind the Varnish server.
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws#ibm

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2023-02-08

Updated:

2023-02-08

RHSA-2023:0673 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: rh-varnish6-varnish security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-varnish6-varnish is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don’t have to create the same web page over and over again, giving the website a significant speed up.

Security Fix(es):

  • varnish: Request Forgery Vulnerability (CVE-2022-45060)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64

Fixes

  • BZ - 2141844 - CVE-2022-45060 varnish: Request Forgery Vulnerability

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7

SRPM

rh-varnish6-varnish-6.0.8-2.el7.2.src.rpm

SHA-256: 3b3067f5d2c3f2cb78fb8ae7701ed2f0d589024c047e9e79b04214132644af2d

x86_64

rh-varnish6-varnish-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 16b1eeb0c1053c40afeb8f2921c41e5c1774b379968c3b8ec98aec3b149cabcb

rh-varnish6-varnish-devel-6.0.8-2.el7.2.x86_64.rpm

SHA-256: b220fd085323705a439045f9897fddc0d2f51315b599aa7f573cabebeb85e007

rh-varnish6-varnish-docs-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 840620bba601cf8067437b978e5efd5da051a4f2eef5bfd1f3a6021ef26e3013

rh-varnish6-varnish-libs-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 5b93db00576ca8f0b545c68cefde48d16bae97c64c55efcbfd027238eb77c987

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7

SRPM

rh-varnish6-varnish-6.0.8-2.el7.2.src.rpm

SHA-256: 3b3067f5d2c3f2cb78fb8ae7701ed2f0d589024c047e9e79b04214132644af2d

s390x

rh-varnish6-varnish-6.0.8-2.el7.2.s390x.rpm

SHA-256: e7342ff44099db7f55d11c955e1761c26a398dd0067b3bfaa94576c602f90ecd

rh-varnish6-varnish-devel-6.0.8-2.el7.2.s390x.rpm

SHA-256: 4255bf3700dd6a9a9c3b4f137cf4eb06faec8cb854c085d46ad4349a0f5ed5bf

rh-varnish6-varnish-docs-6.0.8-2.el7.2.s390x.rpm

SHA-256: 063dd91fc63e55f64828b6902704048b81fee8ff4efea18a5130ddc4b64ae62e

rh-varnish6-varnish-libs-6.0.8-2.el7.2.s390x.rpm

SHA-256: 0059af5a409cfe7a7ddfa3e2c68b89930b15aa134c0742aae94474b3f023cc1b

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7

SRPM

rh-varnish6-varnish-6.0.8-2.el7.2.src.rpm

SHA-256: 3b3067f5d2c3f2cb78fb8ae7701ed2f0d589024c047e9e79b04214132644af2d

ppc64le

rh-varnish6-varnish-6.0.8-2.el7.2.ppc64le.rpm

SHA-256: d8b30fe35af4823ee0d71cdcfea90cae0573c5c81fb78ab940c28f09f09127e5

rh-varnish6-varnish-devel-6.0.8-2.el7.2.ppc64le.rpm

SHA-256: bcca0b7c9c3262f9b0281a5b18442cf9cfb9900eeaceaec5e13584ffedf048fe

rh-varnish6-varnish-docs-6.0.8-2.el7.2.ppc64le.rpm

SHA-256: 3446aff5db5d012abca7d55d33bad267bef16fbb6cb3136ea4fcde1b9e266226

rh-varnish6-varnish-libs-6.0.8-2.el7.2.ppc64le.rpm

SHA-256: 3fecccc7e3a844d5f9f2894516580f1d0a728e4a407d184bc0634c748bd44ea9

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7

SRPM

rh-varnish6-varnish-6.0.8-2.el7.2.src.rpm

SHA-256: 3b3067f5d2c3f2cb78fb8ae7701ed2f0d589024c047e9e79b04214132644af2d

x86_64

rh-varnish6-varnish-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 16b1eeb0c1053c40afeb8f2921c41e5c1774b379968c3b8ec98aec3b149cabcb

rh-varnish6-varnish-devel-6.0.8-2.el7.2.x86_64.rpm

SHA-256: b220fd085323705a439045f9897fddc0d2f51315b599aa7f573cabebeb85e007

rh-varnish6-varnish-docs-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 840620bba601cf8067437b978e5efd5da051a4f2eef5bfd1f3a6021ef26e3013

rh-varnish6-varnish-libs-6.0.8-2.el7.2.x86_64.rpm

SHA-256: 5b93db00576ca8f0b545c68cefde48d16bae97c64c55efcbfd027238eb77c987

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

Red Hat Security Advisory 2023-0673-01

Red Hat Security Advisory 2023-0673-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Red Hat Security Advisory 2022-8643-01

Red Hat Security Advisory 2022-8643-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Red Hat Security Advisory 2022-8646-01

Red Hat Security Advisory 2022-8646-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Red Hat Security Advisory 2022-8650-01

Red Hat Security Advisory 2022-8650-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Red Hat Security Advisory 2022-8644-01

Red Hat Security Advisory 2022-8644-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Red Hat Security Advisory 2022-8647-01

Red Hat Security Advisory 2022-8647-01 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

RHSA-2022:8650: Red Hat Security Advisory: varnish:6 security update

An update for the varnish:6 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45060: varnish: Request Forgery Vulnerability

RHSA-2022:8645: Red Hat Security Advisory: varnish:6 security update

An update for the varnish:6 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45060: varnish: Request Forgery Vulnerability

RHSA-2022:8644: Red Hat Security Advisory: varnish security update

An update for varnish is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45060: varnish: Request Forgery Vulnerability

RHSA-2022:8643: Red Hat Security Advisory: varnish security update

An update for varnish is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45060: varnish: Request Forgery Vulnerability

CVE-2022-45060: Varnish HTTP/2 Request Forgery - Varnish Software Documentation

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.