stable

openconnect-4.08-1.el6

FEDORA-EPEL-2013-0376 created by dwmw2 11 years ago for Fedora EPEL 6

This update fixes a potential buffer overflow in HTTP request generation, which could be triggered by a malicious server generating a large number of cookies or redirecting to a large path or hostname.

This update has been submitted for testing by dwmw2.

11 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

11 years ago

This update has been pushed to testing

11 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

11 years ago

This update has been submitted for stable by dwmw2.

11 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

11 years ago

This update has been pushed to stable

11 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
11 years ago
in testing
11 years ago
in stable
11 years ago
BZ#910330 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists
0
0
BZ#910333 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists [epel-all]
0
0

Automated Test Results