Commit 3dbc284a authored by Dridi Boukelmoune's avatar Dridi Boukelmoune

Missing bits surrounding VSV14

parent 599dd41f
...@@ -14,7 +14,7 @@ Our bi-annual "fresh" release is here: :ref:`rel7.5.0` ...@@ -14,7 +14,7 @@ Our bi-annual "fresh" release is here: :ref:`rel7.5.0`
The 7.3 series is no longer supported in any capacity. The 7.3 series is no longer supported in any capacity.
2024-03-18 - Varnish HTTP/2 Broke Window Attack 2024-03-18 - Varnish HTTP/2 Broke Window Attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
All Varnish Cache releases with HTTP/2 support suffer a vulnerability in All Varnish Cache releases with HTTP/2 support suffer a vulnerability in
the HTTP/2 protocol. Please see :ref:`VSV00014` for more information. the HTTP/2 protocol. Please see :ref:`VSV00014` for more information.
......
...@@ -43,34 +43,52 @@ Timeline ...@@ -43,34 +43,52 @@ Timeline
* **2019-04-19** the vulnerability is theorized (see commit message of e1a1fdc7_) * **2019-04-19** the vulnerability is theorized (see commit message of e1a1fdc7_)
* **2023-08-24** the vulnerability is confirmed * **2023-08-24** the vulnerability is confirmed
* it happened while working on bringing back the parameters ``timeout_req`` * it happened while working on bringing back the parameters ``timeout_req``
and ``timeout_reqbody`` to Varnish Enterprise 6.0 and ``timeout_reqbody`` to Varnish Enterprise 6.0
* **2023-09-20** the vulnerability is studied * **2023-09-20** the vulnerability is studied
* once the timeouts are reintroduced in Varnish Enterprise, work started to * once the timeouts are reintroduced in Varnish Enterprise, work started to
find an appropriate mitigation find an appropriate mitigation
* **2023-10-10** the HTTP/2 Rapid Reset Attack is disclosed * **2023-10-10** the HTTP/2 Rapid Reset Attack is disclosed
* work on the Rapid Reset Attack starts, see :ref:`VSV00013_`
* work on the Rapid Reset Attack starts, see :ref:`VSV00013`
* work on the Broke Window Attack mitigation is postponed * work on the Broke Window Attack mitigation is postponed
* **2023-10-23** CVE-2023-43622 is published * **2023-10-23** CVE-2023-43622 is published
* it describes a subset of the vulnerability for the Apache HTTP Server * it describes a subset of the vulnerability for the Apache HTTP Server
* work on the Broke Window Attack mitigation resumes * work on the Broke Window Attack mitigation resumes
* a first iteration is ready and submitted for a review * a first iteration is ready and submitted for a review
* the Varnish Cache maintainers are informed * the Varnish Cache maintainers are informed
* **2023-11-16** a second iteration is submitted for review * **2023-11-16** a second iteration is submitted for review
* **2023-11-29** the second iteration is approved * **2023-11-29** the second iteration is approved
* Varnish Enterprise ships the mitigation in the 6.0.12r4 release * Varnish Enterprise ships the mitigation in the 6.0.12r4 release
* **2023-12-05** the mitigation is ported to Varnish Cache * **2023-12-05** the mitigation is ported to Varnish Cache
* the master branch is targeted * the master branch is targeted
* the mitigation is not ready to publish * the mitigation is not ready to publish
* **2024-01-15** the port to Varnish Cache resumes * **2024-01-15** the port to Varnish Cache resumes
* ported to supported branches 7.4, 7.4 and 6.0 LTS * ported to supported branches 7.4, 7.4 and 6.0 LTS
* **2024-01-17** a regression is discovered * **2024-01-17** a regression is discovered
* the second iteration of the mitigation is racy * the second iteration of the mitigation is racy
* when a race occurs, it is partially effective * when a race occurs, it is partially effective
* offending HTTP/2 streams are reset, but the connection is not closed * offending HTTP/2 streams are reset, but the connection is not closed
* **2024-01-23** the regression is fixed * **2024-01-23** the regression is fixed
* the ports to Varnish Cache are updated * the ports to Varnish Cache are updated
* a bug fix is submitted to Varnish Enterprise * a bug fix is submitted to Varnish Enterprise
* **2024-03-05** the port to Varnish Cache master branch is updated * **2024-03-05** the port to Varnish Cache master branch is updated
* **2024-03-18** public advisory and releases * **2024-03-18** public advisory and releases
......
...@@ -11,6 +11,7 @@ List of all Varnish CVEs ...@@ -11,6 +11,7 @@ List of all Varnish CVEs
=============== =============== ==================================== =============== =============== ====================================
Versions CVE What Versions CVE What
=============== =============== ==================================== =============== =============== ====================================
5.x, 6.x, 7.x CVE-2023-43622_ :ref:`vsv00014`
5.x, 6.x, 7.x CVE-2023-44487_ :ref:`vsv00013` 5.x, 6.x, 7.x CVE-2023-44487_ :ref:`vsv00013`
vmod_digest CVE-2023-41104_ :ref:`vsv00012` vmod_digest CVE-2023-41104_ :ref:`vsv00012`
6.x, 7.x CVE-2022-45060_ :ref:`vsv00011` 6.x, 7.x CVE-2022-45060_ :ref:`vsv00011`
...@@ -30,6 +31,7 @@ vmod_digest CVE-2023-41104_ :ref:`vsv00012` ...@@ -30,6 +31,7 @@ vmod_digest CVE-2023-41104_ :ref:`vsv00012`
< 2.1.0 CVE-2009-2936_ Trophy hunting < 2.1.0 CVE-2009-2936_ Trophy hunting
=============== =============== ==================================== =============== =============== ====================================
.. _CVE-2023-43622: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
.. _CVE-2023-44487: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487 .. _CVE-2023-44487: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
.. _CVE-2023-41104: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41104 .. _CVE-2023-41104: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41104
.. _CVE-2022-45060: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45060 .. _CVE-2022-45060: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45060
...@@ -52,6 +54,7 @@ vmod_digest CVE-2023-41104_ :ref:`vsv00012` ...@@ -52,6 +54,7 @@ vmod_digest CVE-2023-41104_ :ref:`vsv00012`
:hidden: :hidden:
:maxdepth: 1 :maxdepth: 1
VSV00014.rst
VSV00013.rst VSV00013.rst
VSV00012.rst VSV00012.rst
VSV00011.rst VSV00011.rst
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment