ALT-PU-2024-17486-2
Package openconnect updated to version 8.10-alt1 for branch c9f2 in task 299473.
Closed vulnerabilities
Published: 2019-11-17
BDU:2020-01355
Уязвимость функции process_http_response приложения для подключения к виртуальным частным сетям OpenConnect, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
Severity: HIGH (7.7)
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Severity: HIGH (7.3)
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:P
References:
Published: 2020-04-23
BDU:2023-07616
Уязвимость функции X509_check_ VPN-клиента OpenConnect, позволяющая нарушителю получить доступ к конфиденциальным данным
Severity: MEDIUM (5.9)
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: HIGH (7.1)
Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N
References:
Published: 2019-09-17
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2019-16239
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
- https://seclists.org/bugtraq/2020/Jan/31
- https://t2.fi/schedule/2019/
- https://usn.ubuntu.com/4565-1/
- https://www.debian.org/security/2020/dsa-4607
- http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
- https://seclists.org/bugtraq/2020/Jan/31
- https://t2.fi/schedule/2019/
- https://usn.ubuntu.com/4565-1/
- https://www.debian.org/security/2020/dsa-4607
Published: 2020-04-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-12105
OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: MEDIUM (5.9)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html
- https://gitlab.com/openconnect/openconnect/-/merge_requests/96
- https://security.gentoo.org/glsa/202006-15
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html
- https://gitlab.com/openconnect/openconnect/-/merge_requests/96
- https://security.gentoo.org/glsa/202006-15