First published: Wed Apr 08 2020(Updated: )
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Varnish-cache Varnish Cache | >=6.1.0<6.2.2 | |
Varnish-cache Varnish Cache | >=6.3.0<6.3.1 | |
Varnish-software Varnish Cache | >=6.0.0<6.0.5 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20637
The severity of CVE-2019-20637 is high with a severity value of 7.5.
Varnish Cache versions 6.0.0 to 6.0.5 LTS, 6.1.0 to 6.2.2, and 6.3.0 to 6.3.1 are affected by CVE-2019-20637.
CVE-2019-20637 occurs when Varnish Cache does not clear a pointer between the handling of one client request and the next request within the same connection, leading to potential information disclosure.
Yes, patches and updates are available for CVE-2019-20637. Please refer to the vendor's website for more information.