Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5474-2

Ubuntu Security Notice 5474-2 - USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix for CVE-2020-11653 was incomplete. This update fixes the problem. It was discovered that Varnish Cache could have an assertion failure when a TLS termination proxy uses PROXY version 2. A remote attacker could possibly use this issue to restart the daemon and cause a performance loss.

Packet Storm
#vulnerability#web#ubuntu#ssl
=========================================================================Ubuntu Security Notice USN-5474-2August 23, 2022varnish regression=========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 20.04 LTSSummary:Varnish Cache could be made to restart if it received specially crafted input.Software Description:- varnish: state of the art, high-performance web acceleratorDetails:USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix forCVE-2020-11653 was incomplete. This update fixes the problem.Original advisory details: It was discovered that Varnish Cache could have an assertion failure when a TLS termination proxy uses PROXY version 2. A remote attacker could possibly use this issue to restart the daemon and cause a performance loss. (CVE-2020-11653)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 20.04 LTS:  libvarnishapi2                  6.2.1-2ubuntu0.2  varnish                         6.2.1-2ubuntu0.2In general, a standard system update will make all the necessary changes.References:  https://ubuntu.com/security/notices/USN-5474-2  https://ubuntu.com/security/notices/USN-5474-1  CVE-2020-11653Package Information:  https://launchpad.net/ubuntu/+source/varnish/6.2.1-2ubuntu0.2

Related news

Ubuntu Security Notice USN-5474-1

Ubuntu Security Notice 5474-1 - It was dicovered that Varnish Cache did not clear a pointer between the handling of one client request and the next request within the same connection. A remote attacker could possibly use this issue to obtain sensitive information. It was discovered that Varnish Cache could have an assertion failure when a TLS termination proxy uses PROXY version 2. A remote attacker could possibly use this issue to restart the daemon and cause a performance loss.

CVE-2020-11653: VSV00005 Varnish HTTP Proxy Protocol V2 Denial of Service — Varnish HTTP Cache

An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.

Packet Storm: Latest News

Invesalius 3.1 Arbitrary File Write / Directory Traversal