Bug#1135229: starman: CVE-2026-40560

Salvatore Bonaccorso carnil at debian.org
Wed Apr 29 19:39:14 BST 2026


Source: starman
Version: 0.4017-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for starman.

CVE-2026-40560[0]:
| Starman versions before 0.4018 for Perl allows HTTP Request
| Smuggling via Improper Header Precedence.  Starman incorrectly
| prioritizes "Content-Length" over "Transfer-Encoding: chunked" when
| both headers are present in an HTTP request. Per RFC 7230 3.3.3,
| Transfer-Encoding must take precedence.  An attacker could exploit
| this to smuggle malicious HTTP requests via a front-end reverse
| proxy.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-40560
    https://www.cve.org/CVERecord?id=CVE-2026-40560
[1] https://lists.security.metacpan.org/cve-announce/msg/39426182/
[2] https://github.com/miyagawa/Starman/commit/ced205f0805027e9d9c0731f8c40b104220604ed

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-perl-maintainers mailing list