vulnerability
CentOS Linux: CVE-2019-20637: Moderate: varnish:6 security, bug fix, and enhancement update (CESA-2020:4756)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Apr 8, 2020 | Nov 5, 2020 | May 25, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Apr 8, 2020
Added
Nov 5, 2020
Modified
May 25, 2023
Description
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.
Solutions
centos-upgrade-varnishcentos-upgrade-varnish-develcentos-upgrade-varnish-docscentos-upgrade-varnish-modulescentos-upgrade-varnish-modules-debuginfocentos-upgrade-varnish-modules-debugsource
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.