stable

openconnect-4.08-1.el6

FEDORA-EPEL-2013-0376 created by dwmw2 10 years ago for Fedora EPEL 6

This update fixes a potential buffer overflow in HTTP request generation, which could be triggered by a malicious server generating a large number of cookies or redirecting to a large path or hostname.

This update has been submitted for testing by dwmw2.

10 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

10 years ago

This update has been pushed to testing

10 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

10 years ago

This update has been submitted for stable by dwmw2.

10 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

10 years ago

This update has been pushed to stable

10 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
10 years ago
in testing
10 years ago
in stable
10 years ago
BZ#910330 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists
0
0
BZ#910333 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists [epel-all]
0
0

Automated Test Results