Varnish security update for Debian 12

Published by

A security update has been released for Varnish, the web accelerator, on Debian GNU/Linux 12 (Bookworm). This update addresses a critical issue related to the improper parsing of chunked transfer encodings, which could potentially enable HTTP request smuggling or cache poisoning attacks.

The security advisory, DSA-5918-1, was published on May 13, 2025, by Moritz Muehlenhoff, and it highlights the discovery made by Ben Kallus regarding the vulnerabilities in Varnish. The specific version that includes the fix is 7.1.1-2+deb12u1, and users are urged to upgrade their Varnish packages to mitigate the risks.

For further details about the security status of Varnish, users can consult the security tracker page. Additionally, the advisory provides resources for understanding Debian Security Advisories, applying updates, and finding answers to frequently asked questions.

To extend the information, it is essential to emphasize the importance of regularly updating software packages to protect systems from vulnerabilities. This incident serves as a reminder for system administrators to stay vigilant regarding security updates, as threats can significantly impact web applications and user data. Implementing best practices such as regular system audits, monitoring security advisories, and employing security measures like firewalls can further enhance the security posture of web servers and applications

Varnish security update for Debian 12

A security update for Varnish has been issued for Debian GNU/Linux 12 (Bookworm) to resolve an issue where improper parsing of chunked transfer encodings in the Varnish web accelerator could lead to HTTP request smuggling or cache poisoning:

[DSA 5918-1] varnish security update

Varnish security update for Debian 12 @ Linux Compatible