Change logs for varnish source package in Focal

  • varnish (6.2.1-2ubuntu0.2) focal-security; urgency=medium
    
      * SECURITY REGRESSION: Incomplete fix for CVE-2020-11653 (LP: #1986627)
        - debian/patches/WS_ReserveAll.patch: Rename to CVE-2020-11653-01.patch.
        - debian/patches/WS_ReserveSize.patch: Rename to CVE-2020-11653-02.patch.
        - debian/patches/CVE-2020-11653-03.patch: Add a facility to test
          WS_ReserveSize().
        - debian/patches/CVE-2020-11653-04.patch: Correct the overflow condition in
          WS_ReserveSize().
        - debian/patches/CVE-2020-11653-05.patch: Fix copy-pasted test description.
        - debian/patches/CVE-2020-11653-06.patch: Add Session Attribute workspace
          overflow handling.
        - debian/patches/CVE-2020-11653-07.patch: Simplify WS allocation in
          tlv_string.
        - debian/patches/CVE-2020-11653-08.patch: Try to make the proxy code session
          workspace overflow test on 32-bit platforms.
        - debian/patches/CVE-2020-11653-09.patch: Adjust the workspace session size
          for 32-bit vtest machines.
        - debian/patches/CVE-2020-11653-10.patch: Handle out of session workspace in
          http1_new_session().
        - debian/patches/CVE-2020-11653-11.patch: Remove extra call to
          SES_Reserve_proto_priv().
        - debian/patches/CVE-2020-11653-12.patch: Remove call to
          SES_Reserve_proto_priv() in h2_init_sess().
        - debian/patches/CVE-2020-11653-13.patch: Handle badly formatted proxy TLVs.
        - debian/patches/CVE-2020-11653-14.patch: Add a missing assertion to
          WS_ReserveAll().
        - debian/patches/CVE-2020-11653-15.patch: Fix WS_ReserveSize calls when
          bytes is equal to free workspace.
        - debian/patches/CVE-2020-11653.patch: Rename to CVE-2020-11653-16.patch.
    
     -- Luís Infante da Câmara <email address hidden>  Tue, 16 Aug 2022 17:57:53 +0100
  • varnish (6.2.1-2ubuntu0.1) focal-security; urgency=medium
    
      * SECURITY UPDATE: Sensitive Information Disclosure
        - debian/patches/CVE-2019-20637.patch: Clear err_code and err_reason at
          start of request handling. (LP: #1971504, LP: #1939281)
          CVE-2019-20637
      * SECURITY UPDATE: Assertion failure
        - debian/patches/CVE-2020-11653.patch: Take sizeof pool_task into account
          when reserving WS in SES_Wait. (LP: #1971504, LP: #1939281)
          CVE-2020-11653
      * SECURITY UPDATE: HTTP Request Smuggling
        - debian/patches/CVE-2021-36740.patch: Take content length into
          account on H/2 request bodies. (LP: #1971504, LP: #1939281)
        - debian/patches/CVE-2022-23959.patch: Mark req doclose when failing
          to ignore req body. (LP: #1971504, LP: #1939281)
          CVE-2021-36740
          CVE-2022-23959
      * Additions fixes
        - debian/patches/WS_ReserveAll.patch: Add WS_ReserveAll to replace
          WS_Reserve(ws, 0).
        - debian/patches/WS_ReserveSize.patch: Deprecate WS_Reserve() and replace
          it with WS_ReserveSize().
    
     -- Luís Infante da Câmara <email address hidden>  Wed, 04 May 2022 21:16:37 +0100
  • varnish (6.2.1-2) unstable; urgency=medium
    
      * Update varnishreload script from upstream packaging repo, making
        "reload" work again.  (Thanks, autopkgtest)
      * Add debian/source options from man:dgit-maint-merge(7)
    
     -- Stig Sandbeck Mathisen <email address hidden>  Sun, 08 Sep 2019 08:59:25 +0200
  • varnish (6.1.1-1) unstable; urgency=medium
    
      * Imported new upstream version 6.1.1
      * Set "BSD-2-clause" as license shortname for sphinx doc files
      * Add multiarch metadata
      * autopkgtest: ensure tests pass with sysvinit and systemd
    
     -- Stig Sandbeck Mathisen <email address hidden>  Sat, 01 Dec 2018 13:44:50 +0100