Lukas Kupczyk of the Advanced Research Team at CrowdStrike Intelligence found a buffer overflow in HTTP chunked encoding handling, when the chunk length was mishandled. This is CVE-2019-16239, and has existed since 2008 when I first lamented the fact that I had to do my own HTTP code because none of the existing libraries let me have enough control over the underlying TLS connection. Also fix a bug in GlobalProtect ESP handling when an IPv6 local address exists on the tunnel interface, caused by the workaround for the nasty Pulse protocol handling issue. ftp://ftp.infradead.org/pub/openconnect/openconnect-8.05.tar.gz ftp://ftp.infradead.org/pub/openconnect/openconnect-8.05.tar.gz.asc Corey Wright (1): Only add packet to oNCP control queue with nc and pulse protocols David Woodhouse (4): Update changelog for GP ESP fix Close HTTPS connection on failure returns from process_http_response() Update translations from GNOME Fix buffer overflow with chunked HTTP handling (CVE-2019-16239) Omar Sandoval (1): Don't crash if gnutls_x509_crt_list_import() fails
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ openconnect-devel mailing list openconnect-devel@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/openconnect-devel