MGASA-2020-0251

Source
https://advisories.mageia.org/MGASA-2020-0251.html
Import Source
https://advisories.mageia.org/MGASA-2020-0251.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0251
Related
Published
2020-06-10T22:57:01Z
Modified
2020-06-10T22:19:26Z
Summary
Updated openconnect packages fix security vulnerability
Details

Updated openconnect packages fix security vulnerabilities:

OpenConnect through 8.08 mishandles negative return values from X509check function calls, which might assist attackers in performing man-in-the-middle attacks (CVE-2020-12105).

OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to getcertname in gnutls.c (CVE-2020-12823).

The openconnect package has been updated to version 8.10, fixing these issues and other bugs. See the upstream changelog for details.

References
Credits

Affected packages

Mageia:7 / openconnect

Package

Name
openconnect
Purl
pkg:rpm/mageia/openconnect?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.10-1.mga7

Ecosystem specific

{
    "section": "core"
}