[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4607-1] openconnect security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4607-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 20, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openconnect
CVE ID         : CVE-2019-16239
Debian Bug     : 940871

Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
in openconnect, an open client for Cisco AnyConnect, Pulse and
GlobalProtect VPN. A malicious HTTP server (after having accepted its
identity certificate), can provide bogus chunk lengths for chunked HTTP
encoding and cause a heap-based buffer overflow.

For the oldstable distribution (stretch), this problem has been fixed
in version 7.08-1+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 8.02-1+deb10u1.

We recommend that you upgrade your openconnect packages.

For the detailed security status of openconnect please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/openconnect

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=NhhO
-----END PGP SIGNATURE-----


Reply to: