-
varnish (6.2.1-2ubuntu0.2) focal-security; urgency=medium
* SECURITY REGRESSION: Incomplete fix for CVE-2020-11653 (LP: #1986627)
- debian/patches/WS_ReserveAll.patch: Rename to CVE-2020-11653-01.patch.
- debian/patches/WS_ReserveSize.patch: Rename to CVE-2020-11653-02.patch.
- debian/patches/CVE-2020-11653-03.patch: Add a facility to test
WS_ReserveSize().
- debian/patches/CVE-2020-11653-04.patch: Correct the overflow condition in
WS_ReserveSize().
- debian/patches/CVE-2020-11653-05.patch: Fix copy-pasted test description.
- debian/patches/CVE-2020-11653-06.patch: Add Session Attribute workspace
overflow handling.
- debian/patches/CVE-2020-11653-07.patch: Simplify WS allocation in
tlv_string.
- debian/patches/CVE-2020-11653-08.patch: Try to make the proxy code session
workspace overflow test on 32-bit platforms.
- debian/patches/CVE-2020-11653-09.patch: Adjust the workspace session size
for 32-bit vtest machines.
- debian/patches/CVE-2020-11653-10.patch: Handle out of session workspace in
http1_new_session().
- debian/patches/CVE-2020-11653-11.patch: Remove extra call to
SES_Reserve_proto_priv().
- debian/patches/CVE-2020-11653-12.patch: Remove call to
SES_Reserve_proto_priv() in h2_init_sess().
- debian/patches/CVE-2020-11653-13.patch: Handle badly formatted proxy TLVs.
- debian/patches/CVE-2020-11653-14.patch: Add a missing assertion to
WS_ReserveAll().
- debian/patches/CVE-2020-11653-15.patch: Fix WS_ReserveSize calls when
bytes is equal to free workspace.
- debian/patches/CVE-2020-11653.patch: Rename to CVE-2020-11653-16.patch.
-- Luís Infante da Câmara <email address hidden> Tue, 16 Aug 2022 17:57:53 +0100
-
varnish (6.2.1-2ubuntu0.1) focal-security; urgency=medium
* SECURITY UPDATE: Sensitive Information Disclosure
- debian/patches/CVE-2019-20637.patch: Clear err_code and err_reason at
start of request handling. (LP: #1971504, LP: #1939281)
CVE-2019-20637
* SECURITY UPDATE: Assertion failure
- debian/patches/CVE-2020-11653.patch: Take sizeof pool_task into account
when reserving WS in SES_Wait. (LP: #1971504, LP: #1939281)
CVE-2020-11653
* SECURITY UPDATE: HTTP Request Smuggling
- debian/patches/CVE-2021-36740.patch: Take content length into
account on H/2 request bodies. (LP: #1971504, LP: #1939281)
- debian/patches/CVE-2022-23959.patch: Mark req doclose when failing
to ignore req body. (LP: #1971504, LP: #1939281)
CVE-2021-36740
CVE-2022-23959
* Additions fixes
- debian/patches/WS_ReserveAll.patch: Add WS_ReserveAll to replace
WS_Reserve(ws, 0).
- debian/patches/WS_ReserveSize.patch: Deprecate WS_Reserve() and replace
it with WS_ReserveSize().
-- Luís Infante da Câmara <email address hidden> Wed, 04 May 2022 21:16:37 +0100
-
varnish (6.2.1-2) unstable; urgency=medium
* Update varnishreload script from upstream packaging repo, making
"reload" work again. (Thanks, autopkgtest)
* Add debian/source options from man:dgit-maint-merge(7)
-- Stig Sandbeck Mathisen <email address hidden> Sun, 08 Sep 2019 08:59:25 +0200
-
varnish (6.1.1-1) unstable; urgency=medium
* Imported new upstream version 6.1.1
* Set "BSD-2-clause" as license shortname for sphinx doc files
* Add multiarch metadata
* autopkgtest: ensure tests pass with sysvinit and systemd
-- Stig Sandbeck Mathisen <email address hidden> Sat, 01 Dec 2018 13:44:50 +0100