lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <E1ite0O-0004Yh-3i@seger.debian.org> Date: Mon, 20 Jan 2020 20:50:40 +0000 From: Salvatore Bonaccorso <carnil@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4607-1] openconnect security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4607-1 security@...ian.org https://www.debian.org/security/ Salvatore Bonaccorso January 20, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openconnect CVE ID : CVE-2019-16239 Debian Bug : 940871 Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow. For the oldstable distribution (stretch), this problem has been fixed in version 7.08-1+deb9u1. For the stable distribution (buster), this problem has been fixed in version 8.02-1+deb10u1. We recommend that you upgrade your openconnect packages. For the detailed security status of openconnect please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openconnect Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl4mD45fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TviA/7B/Swa1wkHZ7JPPdBeCHkzuiGAlXmlxhM7vh7fPrjFZfAICMdjC5c2CGB Scwxpi72wWVSTVpDlttcOC13MM4lw6GH0x8bMHZh+yulVofsisvdxjor6fpK83RH f/Lab86N6nJfQiiNNm2rehl6rBcTamnPxQda941cy4qghMRXi+eifyqvLlTl+cWi zXVjx8tebbZpmvI8mrKgmSE5iXHmUMhORHx/yXVHvCTDVL8FNUfGnq4WmNaKReIp zHT5x2xOq9IQtGJMY1o9CjU4bHnvjqXT2bM+G5/hhLI4Y7a8vboxA5F0R5grxY/Y bsOPEXrB3Dm8ve927h21EMvaeAvB/FI6ATy8MxHgUYsCMHQfLdH8bGjeboa3W3XU HDTCcjzmElfdGvQCfxLm6p4odC2Skz0xWf02x3xEe+xwR6OpueFwkHotPjd/iEeh 9yoWVmmpuBRHo9qWGOpd38gDiqrhs4Pdi4ZIhsalYjCF94kc4zYuGgVtnLwRnSb5 54TWApD1zqi+bf1i+3qa3eSmkt3aXB0ctGlTTRA6l9icn+8vKorzdngH20+O0jc5 ewBvlGpvuW2eSoqD9xiRKYd7fejZbcwCgHrTGzDguLp+zZ7KGUt6fSNO6dR/IIXg TdJdHuB/eGWflC6F6cp07POFTIypb4kPgqfD0/AF6ggHLD7fBp8= =NhhO -----END PGP SIGNATURE-----
Powered by blists - more mailing lists