CVE-2020-12105

NameCVE-2020-12105
DescriptionOpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs959428

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openconnect (PTS)jessie6.00-2fixed
jessie (security)6.00-2+deb8u2fixed
stretch (security), stretch7.08-1+deb9u1vulnerable
buster, buster (security)8.02-1+deb10u1vulnerable
bullseye, sid8.10-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openconnectsource(unstable)(unfixed)unimportant959428
openconnectsourcejessie(not affected)

Notes

[jessie] - openconnect <not-affected> (Vulnerable code introduced later)
https://gitlab.com/openconnect/openconnect/-/merge_requests/96
Only an issue if building with OpenSSL, where Debian binary packages use
GnuTLS.

Search for package or bug name: Reporting problems