process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
fedora | eq | 29 | |
fedora | eq | 30 | |
fedora | eq | 31 | |
openconnect | lt | 8.05 | |
leap | eq | 15.0 | |
leap | eq | 15.1 |
lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
lists.debian.org/debian-lts-announce/2019/10/msg00003.html
lists.fedoraproject.org/archives/list/[email protected]/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/
lists.fedoraproject.org/archives/list/[email protected]/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/
lists.fedoraproject.org/archives/list/[email protected]/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
seclists.org/bugtraq/2020/Jan/31
t2.fi/schedule/2019/
usn.ubuntu.com/4565-1/
www.debian.org/security/2020/dsa-4607