openSUSE Security Update : varnish (openSUSE-2016-588)

high Nessus Plugin ID 91205

Synopsis

The remote openSUSE host is missing a security update.

Description

This varnish update to version 3.0.7 fixes the following issues :

Security issues fixed :

- CVE-2015-8852: Vulnerable to HTTP Smuggling issues:
Double Content Length and bad EOL. (boo#976097)

Bugs fixed :

- Stop recognizing a single CR (\r) as a HTTP line separator.

- Improved error detection on master-child process communication, leading to faster recovery (child restart) if communication loses sync.

- Fix a corner-case where Content-Length was wrong for HTTP 1.0 clients, when using gzip and streaming.

- More robust handling of hop-by-hop headers.

- Avoid memory leak when adding bans.

Solution

Update the affected varnish packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=976097

Plugin Details

Severity: High

ID: 91205

File Name: openSUSE-2016-588.nasl

Version: 2.4

Type: local

Agent: unix

Published: 5/18/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvarnishapi1, p-cpe:/a:novell:opensuse:libvarnishapi1-debuginfo, p-cpe:/a:novell:opensuse:varnish, p-cpe:/a:novell:opensuse:varnish-debuginfo, p-cpe:/a:novell:opensuse:varnish-debugsource, p-cpe:/a:novell:opensuse:varnish-devel, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/17/2016

Reference Information

CVE: CVE-2015-8852