Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "workspace overflow" denial of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts with a speculative HTTP/1 transport, and upon upgrading to h2 the HTTP/1 request is repurposed as stream zero. During the upgrade, a buffer allocation is made to reserve space to send frames to the client. This allocation would split the original workspace, and depending on the amount of prefetched data, the next fetch could perform a pipelining operation that would run out of workspace.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://docs.varnish-software.com/security/VEV00002/ |
|
History
Sun, 12 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "workspace overflow" denial of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts with a speculative HTTP/1 transport, and upon upgrading to h2 the HTTP/1 request is repurposed as stream zero. During the upgrade, a buffer allocation is made to reserve space to send frames to the client. This allocation would split the original workspace, and depending on the amount of prefetched data, the next fetch could perform a pipelining operation that would run out of workspace. | |
| First Time appeared |
Varnish-software
Varnish-software varnish Cache |
|
| Weaknesses | CWE-670 | |
| CPEs | cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Varnish-software
Varnish-software varnish Cache |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-12T19:32:07.658Z
Reserved: 2026-04-12T19:17:33.934Z
Link: CVE-2026-40394
No data.
Status : Received
Published: 2026-04-12T20:16:17.857
Modified: 2026-04-12T20:16:17.857
Link: CVE-2026-40394
No data.
OpenCVE Enrichment
No data.
Weaknesses