OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
The product does not handle or incorrectly handles an exceptional condition.
Link | Tags |
---|---|
https://gitlab.com/openconnect/openconnect/-/merge_requests/96 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202006-15 | third party advisory vendor advisory |