openSUSE Security Update : varnish (openSUSE-2016-588)

Medium Nessus Plugin ID 91205


The remote openSUSE host is missing a security update.


This varnish update to version 3.0.7 fixes the following issues :

Security issues fixed :

- CVE-2015-8852: Vulnerable to HTTP Smuggling issues:
Double Content Length and bad EOL. (boo#976097)

Bugs fixed :

- Stop recognizing a single CR (\r) as a HTTP line separator.

- Improved error detection on master-child process communication, leading to faster recovery (child restart) if communication loses sync.

- Fix a corner-case where Content-Length was wrong for HTTP 1.0 clients, when using gzip and streaming.

- More robust handling of hop-by-hop headers.

- Avoid memory leak when adding bans.


Update the affected varnish packages.

See Also

Plugin Details

Severity: Medium

ID: 91205

File Name: openSUSE-2016-588.nasl

Version: $Revision: 2.2 $

Type: local

Agent: unix

Published: 2016/05/18

Modified: 2016/10/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N


Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvarnishapi1, p-cpe:/a:novell:opensuse:libvarnishapi1-debuginfo, p-cpe:/a:novell:opensuse:varnish, p-cpe:/a:novell:opensuse:varnish-debuginfo, p-cpe:/a:novell:opensuse:varnish-debugsource, p-cpe:/a:novell:opensuse:varnish-devel, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/05/17

Reference Information

CVE: CVE-2015-8852