FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2025-12-30 20:43:55 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
| VuXML ID | Description |
| e2d49973-785a-11f0-a1c0-0050569f0b83 | www/varnish7 -- Denial of Service in HTTP/2
Varnish Development Team reports:
A denial of service attack can be performed on Varnish Cache servers
that have the HTTP/2 protocol turned on. An attacker can create a
large number of streams and immediately reset them without ever
reaching the maximum number of concurrent streams allowed for the
session, causing the Varnish server to consume unnecessary
resources processing requests for which the response will not be
delivered.
This attack is a variant of the HTTP/2 Rapid Reset Attack, which was
partially handled as VSV00013.
Discovery 2025-08-13 Entry 2025-08-13 varnish7
< 7.7.2
CVE-2025-8671
https://nvd.nist.gov/vuln/detail/CVE-2025-8671
|
| 89c668d5-2f80-11f0-9632-641c67a117d8 | www/varnish7 -- Request Smuggling Attack
The Varnish Development Team reports:
A client-side desync vulnerability can be triggered in Varnish Cache
and Varnish Enterprise. This vulnerability can be triggered under
specific circumstances involving malformed HTTP/1 requests.
An attacker can abuse a flaw in Varnish's handling of chunked
transfer encoding which allows certain malformed HTTP/1 requests
to exploit improper framing of the message body to smuggle additional
requests. Specifically, Varnish incorrectly permits CRLF to be
skipped to delimit chunk boundaries.
Discovery 2025-05-12 Entry 2025-05-12 varnish7
< 7.7.1
https://varnish-cache.org/security/VSV00016.html
|