Description: This problem allows a trusted client to perform request smuggling and poison the HTTP cache contents with crafted HTTP(S) request messages. This attack requires an upstream server to participate in the smuggling and generate the poison response sequence. Most popular server software are not vulnerable to participation in this attack.
Maintainer, please call for stabilization when ready.
Used in production, works fine on amd64.
parent bug is noglsa, this one either.