FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2025-12-30 20:43:55 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e2d49973-785a-11f0-a1c0-0050569f0b83www/varnish7 -- Denial of Service in HTTP/2

Varnish Development Team reports:

A denial of service attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker can create a large number of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the Varnish server to consume unnecessary resources processing requests for which the response will not be delivered.

This attack is a variant of the HTTP/2 Rapid Reset Attack, which was partially handled as VSV00013.


Discovery 2025-08-13
Entry 2025-08-13
varnish7
< 7.7.2

CVE-2025-8671
https://nvd.nist.gov/vuln/detail/CVE-2025-8671
89c668d5-2f80-11f0-9632-641c67a117d8www/varnish7 -- Request Smuggling Attack

The Varnish Development Team reports:

A client-side desync vulnerability can be triggered in Varnish Cache and Varnish Enterprise. This vulnerability can be triggered under specific circumstances involving malformed HTTP/1 requests.

An attacker can abuse a flaw in Varnish's handling of chunked transfer encoding which allows certain malformed HTTP/1 requests to exploit improper framing of the message body to smuggle additional requests. Specifically, Varnish incorrectly permits CRLF to be skipped to delimit chunk boundaries.


Discovery 2025-05-12
Entry 2025-05-12
varnish7
< 7.7.1

https://varnish-cache.org/security/VSV00016.html