CVE-2020-12105

NameCVE-2020-12105
DescriptionOpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs959428

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openconnect (PTS)jessie, jessie (lts)6.00-2+deb8u2fixed
stretch (security), stretch (lts), stretch7.08-1+deb9u1vulnerable
buster (security), buster, buster (lts)8.02-1+deb10u1vulnerable
bullseye8.10-2vulnerable
bookworm9.01-3vulnerable
sid, trixie9.12-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openconnectsourcewheezy(unfixed)end-of-life
openconnectsourcejessie(not affected)
openconnectsource(unstable)(unfixed)unimportant959428

Notes

[jessie] - openconnect <not-affected> (Vulnerable code introduced later)
https://gitlab.com/openconnect/openconnect/-/merge_requests/96
Only an issue if building with OpenSSL, where Debian binary packages use
GnuTLS.

Search for package or bug name: Reporting problems