Fedora Linux 8782 Published by

A varnish-modules security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: varnish-modules-0.18.0-5.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-2f14ec7663
2022-02-16 01:25:55.828264
--------------------------------------------------------------------------------

Name : varnish-modules
Product : Fedora 35
Version : 0.18.0
Release : 5.fc35
URL :   https://github.com/varnish/varnish-modules
Summary : A collection of modules ("vmods") extending Varnish VCL
Description :
This is a collection of modules ("vmods") extending Varnish VCL used
for describing HTTP request/response policies with additional
capabilities. This collection contains the following vmods:
bodyaccess, header, saintmode, tcp, var, vsthrottle, xkey

--------------------------------------------------------------------------------
Update Information:

New upstream release varnish-6.6.2. A security release. Includes fix for
CVE-2022-23959
--------------------------------------------------------------------------------
ChangeLog:

* Thu Feb 3 2022 Ingvar Hagelund - 0.18.0-5
- Rebuilt for varnish-6.6.2-2
* Thu Feb 3 2022 Ingvar Hagelund - 0.18.0-4
- Rebuilt for varnish-6.6.2
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2045031 - CVE-2022-23959 varnish: HTTP/1 request smuggling vulnerability
  https://bugzilla.redhat.com/show_bug.cgi?id=2045031
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-2f14ec7663' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________