aboutsummaryrefslogtreecommitdiffstats
path: root/english/security/2020/dsa-4607.wml
blob: 48d75a353ecd7c5c7db86c8b37be11abc5f4d273 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
<define-tag description>security update</define-tag>
<define-tag moreinfo>
<p>Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
in openconnect, an open client for Cisco AnyConnect, Pulse and
GlobalProtect VPN. A malicious HTTP server (after having accepted its
identity certificate), can provide bogus chunk lengths for chunked HTTP
encoding and cause a heap-based buffer overflow.</p>

<p>For the oldstable distribution (stretch), this problem has been fixed
in version 7.08-1+deb9u1.</p>

<p>For the stable distribution (buster), this problem has been fixed in
version 8.02-1+deb10u1.</p>

<p>We recommend that you upgrade your openconnect packages.</p>

<p>For the detailed security status of openconnect please refer to its
security tracker page at:
<a href="https://security-tracker.debian.org/tracker/openconnect">https://security-tracker.debian.org/tracker/openconnect</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2020/dsa-4607.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy