Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 4607-1] openconnect security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 4607-1] openconnect security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 4607-1] openconnect security update
  • Date: Mon, 20 Jan 2020 20:50:40 +0000
  • List-archive: https://lists.debian.org/msgid-search/E1ite0O-0004Yh-3i AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Mon, 20 Jan 2020 20:51:49 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <g2-XAUjCYuK.A.xrB.lLhJeB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4607-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 20, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openconnect
CVE ID : CVE-2019-16239
Debian Bug : 940871

Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
in openconnect, an open client for Cisco AnyConnect, Pulse and
GlobalProtect VPN. A malicious HTTP server (after having accepted its
identity certificate), can provide bogus chunk lengths for chunked HTTP
encoding and cause a heap-based buffer overflow.

For the oldstable distribution (stretch), this problem has been fixed
in version 7.08-1+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 8.02-1+deb10u1.

We recommend that you upgrade your openconnect packages.

For the detailed security status of openconnect please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/openconnect

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=NhhO
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 4607-1] openconnect security update, Salvatore Bonaccorso, 20.01.2020

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang