Denial of Service in OpenConnect
ID: | USN-4565-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 18.04 LTS |
Datum: | Di, 6. Oktober 2020, 22:35 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16239 |
Applikationen: | OpenConnect |
Originalnachricht |
|
--===============6717955754653881850== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="ygdb7q2f3uzkn3xg" Content-Disposition: inline --ygdb7q2f3uzkn3xg Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-4565-1 October 05, 2020 openconnect vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: OpenConnect could be made to crash if it received specially crafted input. Software Description: - openconnect: An SSL VPN client Details: It was discovered that OpenConnect has a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. An attacker could use it to provoke a denial of service (crash). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: libopenconnect5 7.08-3ubuntu0.18.04.2 openconnect 7.08-3ubuntu0.18.04.2 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4565-1 CVE-2019-16239 Package Information: https://launchpad.net/ubuntu/+source/openconnect/7.08-3ubuntu0.18.04.2 --ygdb7q2f3uzkn3xg Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEkCdEQ5T6DutSveCybUp5kL3izGYFAl98dHAACgkQbUp5kL3i zGaQrg//WPPzymxo9MdNqaWh/Nz83U5WJ6vI8l7/pCyuNbuopqHMOqKUvi1IgT+a kLnm3q7kU/13OtGrS6/rArAAzolYf3yjL47CdlspBRwux1TE1mtpyYkkpOYLZWnB MMpGdb8iQXnBNf94ZcVDMiodS427r1oK7mYVS1/bPQTpctO0lszXESqWZG3oQW/t XH8ITrW35rUilmEFajoupDjyW31PfRj+q4sARZDNl8D7uNK74H8FJoSo9QWSrj/8 nfmCoVPDW+hU9jKHvpYH2uEscEKacAPATzCFftvc/nv+I3HVFqxPUpS45XwKmH21 2TR0+V6aQcmBn2Kz7DiH4Z+OWokhz7xG766Jy0JCEXa+mOKpo9qi9QwT4C7Kr8Ji ulDb4wc+ZBkJt7JZ/w7B2e0qvB29UD/4sEuv9uJp3zF3T5p9+A02eZSBKdi0hY3y tVUTEUdnQyjQv8+DgXhXFWR3WX4pg++np4Y555SmJ4QLJEihqMTh8+LWltLGBrH/ RxQpUu5a5eWEBwBfNRkCIj0viwGSQhteRaxgEP2rrw4LFZ7GYzxDWWan8j7NSGRR rdgZvp5UVUh7s7vwMEBYv/MoBhwXGUA7+kDM8D+ehmiqFrePAhphWHm7m/5vHINe j8OQjZrjepFQ3sLY2yR7zSlkiA5GOZCOM2EJGzPOPU3/Mr41Ajo= =g+0P -----END PGP SIGNATURE----- --ygdb7q2f3uzkn3xg-- --===============6717955754653881850== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce |