No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Varnish Cache Workspace Overflow Denial of Service via HTTP/2 Upgrade | Varnish Cache: Varnish Enterprise: Varnish Cache and Varnish Enterprise: Denial of Service via workspace overflow |
| Weaknesses | CWE-131 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 13 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Varnish Cache Workspace Overflow Denial of Service via HTTP/2 Upgrade |
Sun, 12 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "workspace overflow" denial of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts with a speculative HTTP/1 transport, and upon upgrading to h2 the HTTP/1 request is repurposed as stream zero. During the upgrade, a buffer allocation is made to reserve space to send frames to the client. This allocation would split the original workspace, and depending on the amount of prefetched data, the next fetch could perform a pipelining operation that would run out of workspace. | |
| First Time appeared |
Varnish-software
Varnish-software varnish Cache |
|
| Weaknesses | CWE-670 | |
| CPEs | cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Varnish-software
Varnish-software varnish Cache |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-13T15:45:55.804Z
Reserved: 2026-04-12T19:17:33.934Z
Link: CVE-2026-40394
Updated: 2026-04-13T15:45:53.119Z
Status : Awaiting Analysis
Published: 2026-04-12T20:16:17.857
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-40394
OpenCVE Enrichment
Updated: 2026-04-13T12:54:02Z