An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
Please bump to 7.1.2.
The bug has been referenced in the following commit(s):
Author: John Helmert III <email@example.com>
AuthorDate: 2022-11-09 18:38:23 +0000
Commit: John Helmert III <firstname.lastname@example.org>
CommitDate: 2022-11-09 18:46:46 +0000
www-servers/varnish: add 7.1.2
Also reenable tests, disable the 4 tests that seem to be Gentoo-specific
Signed-off-by: John Helmert III <email@example.com>
www-servers/varnish/Manifest | 1 +
.../files/varnish-7.1.2-disable-tests.patch | 27 ++++++
www-servers/varnish/varnish-7.1.2.ebuild | 102 +++++++++++++++++++++
3 files changed, 130 insertions(+)