First published: Wed Apr 08 2020(Updated: )
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Varnish-cache Varnish Cache | >=6.1.0<6.2.3 | |
Varnish-cache Varnish Cache | >=6.3.0<6.3.2 | |
Varnish-software Varnish Cache | >=6.0.0<6.0.6 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11653 is a vulnerability in Varnish Cache that occurs when communication with a TLS termination proxy uses PROXY version 2, leading to an assertion failure and daemon restart.
Varnish Cache versions 6.0.0 to 6.0.6 LTS, 6.1.x, 6.2.x, and 6.3.0 to 6.3.2 are affected by CVE-2020-11653.
CVE-2020-11653 has a severity level of high with a CVSS score of 7.5.
To fix CVE-2020-11653, upgrade to Varnish Cache version 6.0.6 LTS, 6.2.3, or 6.3.2.
More information about CVE-2020-11653 can be found at the following references: [1], [2], [3].