Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-16239 (GCVE-0-2019-16239)
Vulnerability from cvelistv5 – Published: 2019-09-17 11:37 – Updated: 2024-08-05 01:10
VLAI?
EPSS
Summary
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:10:41.727Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://t2.fi/schedule/2019/"
},
{
"name": "FEDORA-2019-6969467639",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"name": "FEDORA-2019-1caffa01f2",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"name": "FEDORA-2019-4c0d6e1784",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"name": "[debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"name": "openSUSE-SU-2019:2385",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"name": "openSUSE-SU-2019:2388",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"name": "DSA-4607",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"name": "20200120 [SECURITY] [DSA 4607-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"name": "USN-4565-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4565-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-07T22:06:18.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://t2.fi/schedule/2019/"
},
{
"name": "FEDORA-2019-6969467639",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"name": "FEDORA-2019-1caffa01f2",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"name": "FEDORA-2019-4c0d6e1784",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"name": "[debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"name": "openSUSE-SU-2019:2385",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"name": "openSUSE-SU-2019:2388",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"name": "DSA-4607",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"name": "20200120 [SECURITY] [DSA 4607-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"name": "USN-4565-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4565-1/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://t2.fi/schedule/2019/",
"refsource": "MISC",
"url": "https://t2.fi/schedule/2019/"
},
{
"name": "FEDORA-2019-6969467639",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"name": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html",
"refsource": "CONFIRM",
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"name": "FEDORA-2019-1caffa01f2",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"name": "FEDORA-2019-4c0d6e1784",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"name": "[debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"name": "openSUSE-SU-2019:2385",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"name": "openSUSE-SU-2019:2388",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"name": "DSA-4607",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"name": "20200120 [SECURITY] [DSA 4607-1] openconnect security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"name": "USN-4565-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4565-1/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-16239",
"datePublished": "2019-09-17T11:37:21.000Z",
"dateReserved": "2019-09-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:10:41.727Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-16239",
"date": "2026-04-24",
"epss": "0.08525",
"percentile": "0.92401"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-16239\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-09-17T12:15:10.560\",\"lastModified\":\"2024-11-21T04:30:21.120\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n process_http_response en OpenConnect versiones anteriores a 8.05, presenta un desbordamiento de b\u00fafer cuando un servidor malicioso utiliza la codificaci\u00f3n fragmentada HTTP con tama\u00f1os de fragmento especialmente dise\u00f1ados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.05\",\"matchCriteriaId\":\"FF61237C-3C0F-47C8-8F3C-DEB4D59CB2FF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2020/Jan/31\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://t2.fi/schedule/2019/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://usn.ubuntu.com/4565-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4607\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2020/Jan/31\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://t2.fi/schedule/2019/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://usn.ubuntu.com/4565-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
BDU:2020-01355
Vulnerability from fstec - Published: 17.11.2019
VLAI Severity ?
Title
Уязвимость функции process_http_response приложения для подключения к виртуальным частным сетям OpenConnect, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
Description
Уязвимость функции process_http_response приложения для подключения к виртуальным частным сетям OpenConnect связана с ошибками переполнения буфера. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
Severity ?
Vendor
Canonical Ltd., Сообщество свободного программного обеспечения, Novell Inc., Fedora Project
Software Name
Ubuntu, Debian GNU/Linux, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Workstation Extension, SUSE Linux Enterprise Module for Open Buildservice Development Tools, Fedora, OpenSUSE Leap, OpenConnect
Software Version
16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP4 (SUSE Linux Enterprise Workstation Extension), 15 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 29 (Fedora), 15.0 (OpenSUSE Leap), 15 (SUSE Linux Enterprise Workstation Extension), 15 SP1 (SUSE Linux Enterprise Workstation Extension), 15 SP1 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 15.1 (OpenSUSE Leap), 30 (Fedora), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 31 (Fedora), 19.10 (Ubuntu), 12 SP5 (SUSE Linux Enterprise Workstation Extension), до 8.05 (OpenConnect), 20.04 (Ubuntu)
Possible Mitigations
Использование рекомендаций:
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2019-16239/
Для Ubuntu:
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16239.html
Для Debian GNU/Linux:
https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html
Для OpenConnect:
https://github.com/openconnect/openconnect/commit/875f0a65ab73f4fb581ca870fd3a901bd278f8e8
Для Fedora Project:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
Reference
https://www.suse.com/security/cve/CVE-2019-16239/
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16239.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-16239
https://github.com/openconnect/openconnect/commit/875f0a65ab73f4fb581ca870fd3a901bd278f8e8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
CWE
CWE-120
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:C/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Fedora Project",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP4 (SUSE Linux Enterprise Workstation Extension), 15 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 29 (Fedora), 15.0 (OpenSUSE Leap), 15 (SUSE Linux Enterprise Workstation Extension), 15 SP1 (SUSE Linux Enterprise Workstation Extension), 15 SP1 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 15.1 (OpenSUSE Leap), 30 (Fedora), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 31 (Fedora), 19.10 (Ubuntu), 12 SP5 (SUSE Linux Enterprise Workstation Extension), \u0434\u043e 8.05 (OpenConnect), 20.04 (Ubuntu)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2019-16239/\n\n\u0414\u043b\u044f Ubuntu:\nhttps://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16239.html\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://lists.debian.org/debian-lts-announce/2019/10/msg00003.html\n\n\u0414\u043b\u044f OpenConnect:\nhttps://github.com/openconnect/openconnect/commit/875f0a65ab73f4fb581ca870fd3a901bd278f8e8\n\n\u0414\u043b\u044f Fedora Project:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.11.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "01.06.2020",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.04.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-01355",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-16239",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Debian GNU/Linux, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Workstation Extension, SUSE Linux Enterprise Module for Open Buildservice Development Tools, Fedora, OpenSUSE Leap, OpenConnect",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , Fedora Project Fedora 29 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , Fedora Project Fedora 30 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 31 , Canonical Ltd. Ubuntu 19.10 , Canonical Ltd. Ubuntu 20.04 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 process_http_response \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0441\u0435\u0442\u044f\u043c OpenConnect, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 process_http_response \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0441\u0435\u0442\u044f\u043c OpenConnect \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.suse.com/security/cve/CVE-2019-16239/\nhttps://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16239.html\nhttps://lists.debian.org/debian-lts-announce/2019/10/msg00003.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-16239\nhttps://github.com/openconnect/openconnect/commit/875f0a65ab73f4fb581ca870fd3a901bd278f8e8\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-120",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,7)"
}
SUSE-SU-2019:2744-2
Vulnerability from csaf_suse - Published: 2019-11-14 16:03 - Updated: 2019-11-14 16:03Summary
Security update for openconnect
Severity
Moderate
Notes
Title of the patch: Security update for openconnect
Description of the patch: This update for openconnect fixes the following issues:
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
Patchnames: SUSE-2019-2744,SUSE-SLE-WE-12-SP5-2019-2744
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n \n- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2744,SUSE-SLE-WE-12-SP5-2019-2744",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2744-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2744-2",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192744-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2744-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006140.html"
},
{
"category": "self",
"summary": "SUSE Bug 1151178",
"url": "https://bugzilla.suse.com/1151178"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2019-11-14T16:03:02Z",
"generator": {
"date": "2019-11-14T16:03:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2744-2",
"initial_release_date": "2019-11-14T16:03:02Z",
"revision_history": [
{
"date": "2019-11-14T16:03:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-7.08-3.4.1.aarch64",
"product_id": "openconnect-7.08-3.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-devel-7.08-3.4.1.aarch64",
"product_id": "openconnect-devel-7.08-3.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-doc-7.08-3.4.1.aarch64",
"product_id": "openconnect-doc-7.08-3.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.i586",
"product": {
"name": "openconnect-7.08-3.4.1.i586",
"product_id": "openconnect-7.08-3.4.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.i586",
"product": {
"name": "openconnect-devel-7.08-3.4.1.i586",
"product_id": "openconnect-devel-7.08-3.4.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.i586",
"product": {
"name": "openconnect-doc-7.08-3.4.1.i586",
"product_id": "openconnect-doc-7.08-3.4.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-3.4.1.noarch",
"product": {
"name": "openconnect-lang-7.08-3.4.1.noarch",
"product_id": "openconnect-lang-7.08-3.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-7.08-3.4.1.ppc64le",
"product_id": "openconnect-7.08-3.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-devel-7.08-3.4.1.ppc64le",
"product_id": "openconnect-devel-7.08-3.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-doc-7.08-3.4.1.ppc64le",
"product_id": "openconnect-doc-7.08-3.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.s390",
"product": {
"name": "openconnect-7.08-3.4.1.s390",
"product_id": "openconnect-7.08-3.4.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.s390",
"product": {
"name": "openconnect-devel-7.08-3.4.1.s390",
"product_id": "openconnect-devel-7.08-3.4.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.s390",
"product": {
"name": "openconnect-doc-7.08-3.4.1.s390",
"product_id": "openconnect-doc-7.08-3.4.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-7.08-3.4.1.s390x",
"product_id": "openconnect-7.08-3.4.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-devel-7.08-3.4.1.s390x",
"product_id": "openconnect-devel-7.08-3.4.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-doc-7.08-3.4.1.s390x",
"product_id": "openconnect-doc-7.08-3.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-7.08-3.4.1.x86_64",
"product_id": "openconnect-7.08-3.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-3.4.1.x86_64",
"product_id": "openconnect-devel-7.08-3.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-3.4.1.x86_64",
"product_id": "openconnect-doc-7.08-3.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-3.4.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.4.1.x86_64"
},
"product_reference": "openconnect-7.08-3.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-3.4.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.4.1.noarch"
},
"product_reference": "openconnect-lang-7.08-3.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.4.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.4.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.4.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T16:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
SUSE-SU-2019:2744-1
Vulnerability from csaf_suse - Published: 2019-10-22 13:50 - Updated: 2019-10-22 13:50Summary
Security update for openconnect
Severity
Moderate
Notes
Title of the patch: Security update for openconnect
Description of the patch: This update for openconnect fixes the following issues:
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
Patchnames: SUSE-2019-2744,SUSE-SLE-DESKTOP-12-SP4-2019-2744,SUSE-SLE-WE-12-SP4-2019-2744
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n \n- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2744,SUSE-SLE-DESKTOP-12-SP4-2019-2744,SUSE-SLE-WE-12-SP4-2019-2744",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2744-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2744-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192744-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2744-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006039.html"
},
{
"category": "self",
"summary": "SUSE Bug 1151178",
"url": "https://bugzilla.suse.com/1151178"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2019-10-22T13:50:49Z",
"generator": {
"date": "2019-10-22T13:50:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2744-1",
"initial_release_date": "2019-10-22T13:50:49Z",
"revision_history": [
{
"date": "2019-10-22T13:50:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-7.08-3.4.1.aarch64",
"product_id": "openconnect-7.08-3.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-devel-7.08-3.4.1.aarch64",
"product_id": "openconnect-devel-7.08-3.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.aarch64",
"product": {
"name": "openconnect-doc-7.08-3.4.1.aarch64",
"product_id": "openconnect-doc-7.08-3.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.i586",
"product": {
"name": "openconnect-7.08-3.4.1.i586",
"product_id": "openconnect-7.08-3.4.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.i586",
"product": {
"name": "openconnect-devel-7.08-3.4.1.i586",
"product_id": "openconnect-devel-7.08-3.4.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.i586",
"product": {
"name": "openconnect-doc-7.08-3.4.1.i586",
"product_id": "openconnect-doc-7.08-3.4.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-3.4.1.noarch",
"product": {
"name": "openconnect-lang-7.08-3.4.1.noarch",
"product_id": "openconnect-lang-7.08-3.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-7.08-3.4.1.ppc64le",
"product_id": "openconnect-7.08-3.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-devel-7.08-3.4.1.ppc64le",
"product_id": "openconnect-devel-7.08-3.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.ppc64le",
"product": {
"name": "openconnect-doc-7.08-3.4.1.ppc64le",
"product_id": "openconnect-doc-7.08-3.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.s390",
"product": {
"name": "openconnect-7.08-3.4.1.s390",
"product_id": "openconnect-7.08-3.4.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.s390",
"product": {
"name": "openconnect-devel-7.08-3.4.1.s390",
"product_id": "openconnect-devel-7.08-3.4.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.s390",
"product": {
"name": "openconnect-doc-7.08-3.4.1.s390",
"product_id": "openconnect-doc-7.08-3.4.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-7.08-3.4.1.s390x",
"product_id": "openconnect-7.08-3.4.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-devel-7.08-3.4.1.s390x",
"product_id": "openconnect-devel-7.08-3.4.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.s390x",
"product": {
"name": "openconnect-doc-7.08-3.4.1.s390x",
"product_id": "openconnect-doc-7.08-3.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-7.08-3.4.1.x86_64",
"product_id": "openconnect-7.08-3.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-3.4.1.x86_64",
"product_id": "openconnect-devel-7.08-3.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.4.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-3.4.1.x86_64",
"product_id": "openconnect-doc-7.08-3.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-3.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:openconnect-7.08-3.4.1.x86_64"
},
"product_reference": "openconnect-7.08-3.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-3.4.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:openconnect-lang-7.08-3.4.1.noarch"
},
"product_reference": "openconnect-lang-7.08-3.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-3.4.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.4.1.x86_64"
},
"product_reference": "openconnect-7.08-3.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-3.4.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.4.1.noarch"
},
"product_reference": "openconnect-lang-7.08-3.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-lang-7.08-3.4.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.4.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-lang-7.08-3.4.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.4.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:openconnect-lang-7.08-3.4.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.4.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-22T13:50:49Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
SUSE-SU-2019:2737-1
Vulnerability from csaf_suse - Published: 2019-10-22 10:02 - Updated: 2019-10-22 10:02Summary
Security update for openconnect
Severity
Moderate
Notes
Title of the patch: Security update for openconnect
Description of the patch: This update for openconnect fixes the following issues:
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
Patchnames: SUSE-2019-2737,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2737,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2737,SUSE-SLE-Product-WE-15-2019-2737,SUSE-SLE-Product-WE-15-SP1-2019-2737
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\n- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2737,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2737,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2737,SUSE-SLE-Product-WE-15-2019-2737,SUSE-SLE-Product-WE-15-SP1-2019-2737",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2737-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2737-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192737-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2737-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006036.html"
},
{
"category": "self",
"summary": "SUSE Bug 1151178",
"url": "https://bugzilla.suse.com/1151178"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2019-10-22T10:02:43Z",
"generator": {
"date": "2019-10-22T10:02:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2737-1",
"initial_release_date": "2019-10-22T10:02:43Z",
"revision_history": [
{
"date": "2019-10-22T10:02:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.3.1.aarch64",
"product": {
"name": "openconnect-7.08-6.3.1.aarch64",
"product_id": "openconnect-7.08-6.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.3.1.aarch64",
"product": {
"name": "openconnect-devel-7.08-6.3.1.aarch64",
"product_id": "openconnect-devel-7.08-6.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.3.1.aarch64",
"product": {
"name": "openconnect-doc-7.08-6.3.1.aarch64",
"product_id": "openconnect-doc-7.08-6.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.3.1.i586",
"product": {
"name": "openconnect-7.08-6.3.1.i586",
"product_id": "openconnect-7.08-6.3.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.3.1.i586",
"product": {
"name": "openconnect-devel-7.08-6.3.1.i586",
"product_id": "openconnect-devel-7.08-6.3.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.3.1.i586",
"product": {
"name": "openconnect-doc-7.08-6.3.1.i586",
"product_id": "openconnect-doc-7.08-6.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-6.3.1.noarch",
"product": {
"name": "openconnect-lang-7.08-6.3.1.noarch",
"product_id": "openconnect-lang-7.08-6.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.3.1.ppc64le",
"product": {
"name": "openconnect-7.08-6.3.1.ppc64le",
"product_id": "openconnect-7.08-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.3.1.ppc64le",
"product": {
"name": "openconnect-devel-7.08-6.3.1.ppc64le",
"product_id": "openconnect-devel-7.08-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.3.1.ppc64le",
"product": {
"name": "openconnect-doc-7.08-6.3.1.ppc64le",
"product_id": "openconnect-doc-7.08-6.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.3.1.s390x",
"product": {
"name": "openconnect-7.08-6.3.1.s390x",
"product_id": "openconnect-7.08-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.3.1.s390x",
"product": {
"name": "openconnect-devel-7.08-6.3.1.s390x",
"product_id": "openconnect-devel-7.08-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.3.1.s390x",
"product": {
"name": "openconnect-doc-7.08-6.3.1.s390x",
"product_id": "openconnect-doc-7.08-6.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.3.1.x86_64",
"product": {
"name": "openconnect-7.08-6.3.1.x86_64",
"product_id": "openconnect-7.08-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.3.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-6.3.1.x86_64",
"product_id": "openconnect-devel-7.08-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.3.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-6.3.1.x86_64",
"product_id": "openconnect-doc-7.08-6.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-6.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:openconnect-7.08-6.3.1.x86_64"
},
"product_reference": "openconnect-7.08-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-6.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:openconnect-devel-7.08-6.3.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-6.3.1.noarch as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:openconnect-lang-7.08-6.3.1.noarch"
},
"product_reference": "openconnect-lang-7.08-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-6.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.3.1.x86_64"
},
"product_reference": "openconnect-7.08-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-6.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.3.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-6.3.1.noarch as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.3.1.noarch"
},
"product_reference": "openconnect-lang-7.08-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-lang-7.08-6.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-lang-7.08-6.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-devel-7.08-6.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:openconnect-lang-7.08-6.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-22T10:02:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
OPENSUSE-SU-2019:2388-1
Vulnerability from csaf_opensuse - Published: 2019-10-27 15:24 - Updated: 2019-10-27 15:24Summary
Security update for openconnect
Severity
Moderate
Notes
Title of the patch: Security update for openconnect
Description of the patch: This update for openconnect fixes the following issues:
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2388
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\n- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2388",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2388-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2388-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6SM5TIDEA2A2WT7EFKR25Y6XNWRI675/#S6SM5TIDEA2A2WT7EFKR25Y6XNWRI675"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2388-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6SM5TIDEA2A2WT7EFKR25Y6XNWRI675/#S6SM5TIDEA2A2WT7EFKR25Y6XNWRI675"
},
{
"category": "self",
"summary": "SUSE Bug 1151178",
"url": "https://bugzilla.suse.com/1151178"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2019-10-27T15:24:56Z",
"generator": {
"date": "2019-10-27T15:24:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2388-1",
"initial_release_date": "2019-10-27T15:24:56Z",
"revision_history": [
{
"date": "2019-10-27T15:24:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-lp150.5.3.1.noarch",
"product": {
"name": "openconnect-lang-7.08-lp150.5.3.1.noarch",
"product_id": "openconnect-lang-7.08-lp150.5.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-lp150.5.3.1.x86_64",
"product": {
"name": "openconnect-7.08-lp150.5.3.1.x86_64",
"product_id": "openconnect-7.08-lp150.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-lp150.5.3.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-lp150.5.3.1.x86_64",
"product_id": "openconnect-devel-7.08-lp150.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-lp150.5.3.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-lp150.5.3.1.x86_64",
"product_id": "openconnect-doc-7.08-lp150.5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:openconnect-7.08-lp150.5.3.1.x86_64"
},
"product_reference": "openconnect-7.08-lp150.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:openconnect-devel-7.08-lp150.5.3.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-lp150.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-7.08-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:openconnect-doc-7.08-lp150.5.3.1.x86_64"
},
"product_reference": "openconnect-doc-7.08-lp150.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-lp150.5.3.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:openconnect-lang-7.08-lp150.5.3.1.noarch"
},
"product_reference": "openconnect-lang-7.08-lp150.5.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:openconnect-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-devel-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-doc-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-lang-7.08-lp150.5.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:openconnect-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-devel-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-doc-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-lang-7.08-lp150.5.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:openconnect-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-devel-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-doc-7.08-lp150.5.3.1.x86_64",
"openSUSE Leap 15.0:openconnect-lang-7.08-lp150.5.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-27T15:24:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
OPENSUSE-SU-2024:13322-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libopenconnect5-9.12-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: libopenconnect5-9.12-2.1 on GA media
Description of the patch: These are all security issues fixed in the libopenconnect5-9.12-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-13322
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libopenconnect5-9.12-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libopenconnect5-9.12-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13322",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13322-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "libopenconnect5-9.12-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13322-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-9.12-2.1.aarch64",
"product": {
"name": "libopenconnect5-9.12-2.1.aarch64",
"product_id": "libopenconnect5-9.12-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-2.1.aarch64",
"product": {
"name": "openconnect-9.12-2.1.aarch64",
"product_id": "openconnect-9.12-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-9.12-2.1.aarch64",
"product": {
"name": "openconnect-bash-completion-9.12-2.1.aarch64",
"product_id": "openconnect-bash-completion-9.12-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-2.1.aarch64",
"product": {
"name": "openconnect-devel-9.12-2.1.aarch64",
"product_id": "openconnect-devel-9.12-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-9.12-2.1.aarch64",
"product": {
"name": "openconnect-doc-9.12-2.1.aarch64",
"product_id": "openconnect-doc-9.12-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-lang-9.12-2.1.aarch64",
"product": {
"name": "openconnect-lang-9.12-2.1.aarch64",
"product_id": "openconnect-lang-9.12-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-9.12-2.1.ppc64le",
"product": {
"name": "libopenconnect5-9.12-2.1.ppc64le",
"product_id": "libopenconnect5-9.12-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-2.1.ppc64le",
"product": {
"name": "openconnect-9.12-2.1.ppc64le",
"product_id": "openconnect-9.12-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-9.12-2.1.ppc64le",
"product": {
"name": "openconnect-bash-completion-9.12-2.1.ppc64le",
"product_id": "openconnect-bash-completion-9.12-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-2.1.ppc64le",
"product": {
"name": "openconnect-devel-9.12-2.1.ppc64le",
"product_id": "openconnect-devel-9.12-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-9.12-2.1.ppc64le",
"product": {
"name": "openconnect-doc-9.12-2.1.ppc64le",
"product_id": "openconnect-doc-9.12-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-lang-9.12-2.1.ppc64le",
"product": {
"name": "openconnect-lang-9.12-2.1.ppc64le",
"product_id": "openconnect-lang-9.12-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-9.12-2.1.s390x",
"product": {
"name": "libopenconnect5-9.12-2.1.s390x",
"product_id": "libopenconnect5-9.12-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-2.1.s390x",
"product": {
"name": "openconnect-9.12-2.1.s390x",
"product_id": "openconnect-9.12-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-9.12-2.1.s390x",
"product": {
"name": "openconnect-bash-completion-9.12-2.1.s390x",
"product_id": "openconnect-bash-completion-9.12-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-2.1.s390x",
"product": {
"name": "openconnect-devel-9.12-2.1.s390x",
"product_id": "openconnect-devel-9.12-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-9.12-2.1.s390x",
"product": {
"name": "openconnect-doc-9.12-2.1.s390x",
"product_id": "openconnect-doc-9.12-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-lang-9.12-2.1.s390x",
"product": {
"name": "openconnect-lang-9.12-2.1.s390x",
"product_id": "openconnect-lang-9.12-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-9.12-2.1.x86_64",
"product": {
"name": "libopenconnect5-9.12-2.1.x86_64",
"product_id": "libopenconnect5-9.12-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-2.1.x86_64",
"product": {
"name": "openconnect-9.12-2.1.x86_64",
"product_id": "openconnect-9.12-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-9.12-2.1.x86_64",
"product": {
"name": "openconnect-bash-completion-9.12-2.1.x86_64",
"product_id": "openconnect-bash-completion-9.12-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-2.1.x86_64",
"product": {
"name": "openconnect-devel-9.12-2.1.x86_64",
"product_id": "openconnect-devel-9.12-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-9.12-2.1.x86_64",
"product": {
"name": "openconnect-doc-9.12-2.1.x86_64",
"product_id": "openconnect-doc-9.12-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-lang-9.12-2.1.x86_64",
"product": {
"name": "openconnect-lang-9.12-2.1.x86_64",
"product_id": "openconnect-lang-9.12-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-9.12-2.1.aarch64"
},
"product_reference": "libopenconnect5-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-9.12-2.1.ppc64le"
},
"product_reference": "libopenconnect5-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-9.12-2.1.s390x"
},
"product_reference": "libopenconnect5-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-9.12-2.1.x86_64"
},
"product_reference": "libopenconnect5-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-9.12-2.1.aarch64"
},
"product_reference": "openconnect-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-9.12-2.1.ppc64le"
},
"product_reference": "openconnect-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-9.12-2.1.s390x"
},
"product_reference": "openconnect-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-9.12-2.1.x86_64"
},
"product_reference": "openconnect-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.aarch64"
},
"product_reference": "openconnect-bash-completion-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.ppc64le"
},
"product_reference": "openconnect-bash-completion-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.s390x"
},
"product_reference": "openconnect-bash-completion-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.x86_64"
},
"product_reference": "openconnect-bash-completion-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-9.12-2.1.aarch64"
},
"product_reference": "openconnect-devel-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-9.12-2.1.ppc64le"
},
"product_reference": "openconnect-devel-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-9.12-2.1.s390x"
},
"product_reference": "openconnect-devel-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-9.12-2.1.x86_64"
},
"product_reference": "openconnect-devel-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-9.12-2.1.aarch64"
},
"product_reference": "openconnect-doc-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-9.12-2.1.ppc64le"
},
"product_reference": "openconnect-doc-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-9.12-2.1.s390x"
},
"product_reference": "openconnect-doc-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-9.12-2.1.x86_64"
},
"product_reference": "openconnect-doc-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-9.12-2.1.aarch64"
},
"product_reference": "openconnect-lang-9.12-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-9.12-2.1.ppc64le"
},
"product_reference": "openconnect-lang-9.12-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-9.12-2.1.s390x"
},
"product_reference": "openconnect-lang-9.12-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-9.12-2.1.x86_64"
},
"product_reference": "openconnect-lang-9.12-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.aarch64",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.s390x",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.aarch64",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.s390x",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.aarch64",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.s390x",
"openSUSE Tumbleweed:libopenconnect5-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-devel-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-doc-9.12-2.1.x86_64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.aarch64",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.s390x",
"openSUSE Tumbleweed:openconnect-lang-9.12-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
OPENSUSE-SU-2019:2385-1
Vulnerability from csaf_opensuse - Published: 2019-10-27 11:24 - Updated: 2019-10-27 11:24Summary
Security update for openconnect
Severity
Moderate
Notes
Title of the patch: Security update for openconnect
Description of the patch: This update for openconnect fixes the following issues:
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2385
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\n- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2385",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2385-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2385-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OMWRLYJKRILC67XCZYLWTYG2K7ETPHND/#OMWRLYJKRILC67XCZYLWTYG2K7ETPHND"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2385-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OMWRLYJKRILC67XCZYLWTYG2K7ETPHND/#OMWRLYJKRILC67XCZYLWTYG2K7ETPHND"
},
{
"category": "self",
"summary": "SUSE Bug 1151178",
"url": "https://bugzilla.suse.com/1151178"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16239/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2019-10-27T11:24:22Z",
"generator": {
"date": "2019-10-27T11:24:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2385-1",
"initial_release_date": "2019-10-27T11:24:22Z",
"revision_history": [
{
"date": "2019-10-27T11:24:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-lp151.6.3.1.noarch",
"product": {
"name": "openconnect-lang-7.08-lp151.6.3.1.noarch",
"product_id": "openconnect-lang-7.08-lp151.6.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-lp151.6.3.1.x86_64",
"product": {
"name": "openconnect-7.08-lp151.6.3.1.x86_64",
"product_id": "openconnect-7.08-lp151.6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-lp151.6.3.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-lp151.6.3.1.x86_64",
"product_id": "openconnect-devel-7.08-lp151.6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-lp151.6.3.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-lp151.6.3.1.x86_64",
"product_id": "openconnect-doc-7.08-lp151.6.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-7.08-lp151.6.3.1.x86_64"
},
"product_reference": "openconnect-7.08-lp151.6.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.3.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-lp151.6.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-7.08-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.3.1.x86_64"
},
"product_reference": "openconnect-doc-7.08-lp151.6.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-lp151.6.3.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.3.1.noarch"
},
"product_reference": "openconnect-lang-7.08-lp151.6.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16239"
}
],
"notes": [
{
"category": "general",
"text": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16239",
"url": "https://www.suse.com/security/cve/CVE-2019-16239"
},
{
"category": "external",
"summary": "SUSE Bug 1151178 for CVE-2019-16239",
"url": "https://bugzilla.suse.com/1151178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.3.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-27T11:24:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-16239"
}
]
}
GSD-2019-16239
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-16239",
"description": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"id": "GSD-2019-16239",
"references": [
"https://www.suse.com/security/cve/CVE-2019-16239.html",
"https://www.debian.org/security/2020/dsa-4607",
"https://ubuntu.com/security/CVE-2019-16239",
"https://advisories.mageia.org/CVE-2019-16239.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-16239"
],
"details": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"id": "GSD-2019-16239",
"modified": "2023-12-13T01:23:40.869598Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://t2.fi/schedule/2019/",
"refsource": "MISC",
"url": "https://t2.fi/schedule/2019/"
},
{
"name": "FEDORA-2019-6969467639",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"name": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html",
"refsource": "CONFIRM",
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"name": "FEDORA-2019-1caffa01f2",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"name": "FEDORA-2019-4c0d6e1784",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"name": "[debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"name": "openSUSE-SU-2019:2385",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"name": "openSUSE-SU-2019:2388",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"name": "DSA-4607",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"name": "20200120 [SECURITY] [DSA 4607-1] openconnect security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"name": "USN-4565-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4565-1/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.05",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16239"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"name": "FEDORA-2019-6969467639",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"name": "https://t2.fi/schedule/2019/",
"refsource": "MISC",
"tags": [
"Not Applicable"
],
"url": "https://t2.fi/schedule/2019/"
},
{
"name": "FEDORA-2019-4c0d6e1784",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"name": "FEDORA-2019-1caffa01f2",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"name": "[debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"name": "openSUSE-SU-2019:2385",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"name": "openSUSE-SU-2019:2388",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"name": "DSA-4607",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"name": "20200120 [SECURITY] [DSA 4607-1] openconnect security update",
"refsource": "BUGTRAQ",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"name": "USN-4565-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4565-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-03-29T18:42Z",
"publishedDate": "2019-09-17T12:15Z"
}
}
}
FKIE_CVE-2019-16239
Vulnerability from fkie_nvd - Published: 2019-09-17 12:15 - Updated: 2024-11-21 04:30
Severity ?
Summary
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html | Broken Link | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/ | ||
| cve@mitre.org | https://seclists.org/bugtraq/2020/Jan/31 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://t2.fi/schedule/2019/ | Not Applicable | |
| cve@mitre.org | https://usn.ubuntu.com/4565-1/ | Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2020/dsa-4607 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2020/Jan/31 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://t2.fi/schedule/2019/ | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4565-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4607 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| infradead | openconnect | * | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| canonical | ubuntu_linux | 18.04 | |
| opensuse | leap | 15.0 | |
| opensuse | leap | 15.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF61237C-3C0F-47C8-8F3C-DEB4D59CB2FF",
"versionEndExcluding": "8.05",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
},
{
"lang": "es",
"value": "La funci\u00f3n process_http_response en OpenConnect versiones anteriores a 8.05, presenta un desbordamiento de b\u00fafer cuando un servidor malicioso utiliza la codificaci\u00f3n fragmentada HTTP con tama\u00f1os de fragmento especialmente dise\u00f1ados."
}
],
"id": "CVE-2019-16239",
"lastModified": "2024-11-21T04:30:21.120",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-09-17T12:15:10.560",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://t2.fi/schedule/2019/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4565-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://t2.fi/schedule/2019/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4565-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4607"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-J5C8-5345-567F
Vulnerability from github – Published: 2022-05-24 16:56 – Updated: 2023-03-29 21:30
VLAI?
Details
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Severity ?
9.8 (Critical)
{
"affected": [],
"aliases": [
"CVE-2019-16239"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-09-17T12:15:00Z",
"severity": "HIGH"
},
"details": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.",
"id": "GHSA-j5c8-5345-567f",
"modified": "2023-03-29T21:30:22Z",
"published": "2022-05-24T16:56:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16239"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2020/Jan/31"
},
{
"type": "WEB",
"url": "https://t2.fi/schedule/2019"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4565-1"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2020/dsa-4607"
},
{
"type": "WEB",
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…