USN-5474-2: Varnish Cache regression
Publication date
23 August 2022
Overview
Varnish Cache could be made to restart if it received specially crafted input.
Releases
Packages
- varnish - state of the art, high-performance web accelerator
Details
USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix for
CVE-2020-11653 was incomplete. This update fixes the problem.
Original advisory details:
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart the daemon and cause a performance loss.
(CVE-2020-11653)
USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix for
CVE-2020-11653 was incomplete. This update fixes the problem.
Original advisory details:
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart the daemon and cause a performance loss.
(CVE-2020-11653)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | varnish – 6.2.1-2ubuntu0.2 | ||
libvarnishapi2 – 6.2.1-2ubuntu0.2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.