CVE-2022-38150
Published on: Not Yet Published
Last Modified on: 11/29/2022 05:35:00 PM UTC
Certain versions of Fedora from Fedoraproject contain the following vulnerability:
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
- CVE-2022-38150 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] Fedora 35 Update: varnish-6.6.2-3.fc35 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 36 Update: varnish-modules-0.19.0-5.fc36 - package-announce - Fedora Mailing-Lists | Third Party Advisory lists.fedoraproject.org text/html |
![]() |
VSV00009 Varnish Denial of Service Vulnerability — Varnish HTTP Cache | varnish-cache.org text/html |
![]() |
[SECURITY] Fedora 36 Update: varnish-7.0.3-1.fc36 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
Related QID Numbers
- 184036 Debian Security Update for varnish (CVE-2022-38150)
- 283056 Fedora Security Update for varnish (FEDORA-2022-1fa6d1ed2f)
- 283072 Fedora Security Update for varnish (FEDORA-2022-99702d9bdd)
- 283349 Fedora Security Update for varnish (FEDORA-2022-99c5ddb2ae)
- 503135 Alpine Linux Security Update for varnish
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Fedoraproject | Fedora | 35 | All | All | All |
Operating System | Fedoraproject | Fedora | 36 | All | All | All |
Application | Varnish Cache Project | Varnish Cache | 7.0.0 | All | All | All |
Application | Varnish Cache Project | Varnish Cache | 7.0.1 | All | All | All |
Application | Varnish Cache Project | Varnish Cache | 7.0.2 | All | All | All |
Application | Varnish Cache Project | Varnish Cache | 7.1.0 | All | All | All |
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*:
- cpe:2.3:a:varnish_cache_project:varnish_cache:7.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:varnish_cache_project:varnish_cache:7.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:varnish_cache_project:varnish_cache:7.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:varnish_cache_project:varnish_cache:7.1.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-38150 : In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to ass… twitter.com/i/web/status/1… | 2022-08-11 01:02:41 |
![]() |
CVE-2022-38150 | 2022-08-11 01:38:27 |