CVE-2019-20637

NameCVE-2019-20637
DescriptionAn issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs956305

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
varnish (PTS)jessie (security), jessie4.0.2-1+deb8u1fixed
stretch (security), stretch5.0.0-7+deb9u2vulnerable
buster, buster (security)6.1.1-1+deb10u1vulnerable
bullseye, sid6.4.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
varnishsource(unstable)6.4.0-1956305
varnishsourcejessie(not affected)

Notes

[buster] - varnish <no-dsa> (Minor issue)
[stretch] - varnish <no-dsa> (Minor issue)
[jessie] - varnish <not-affected> (Vulnerability introduced later, PoC not leaking)
http://varnish-cache.org/security/VSV00004.html#vsv00004
https://github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c (6.x fix)
https://github.com/varnishcache/varnish-cache/commit/0c9c38513bdb7730ac886eba7563f2d87894d734 (test case / reproducer)
Introduced in https://github.com/varnishcache/varnish-cache/commit/62932b422f311ed1224f14a216169bcdc1b77a2d (5.0)
Case #3 implies labels introduced in https://github.com/varnishcache/varnish-cache/commit/34350d5e183ef4e04285729d1f63b784d1bc6454 (5.0)

Search for package or bug name: Reporting problems