Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenVPN
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenVPN
ID: USN-4933-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, Ubuntu 21.04
Datum: Mi, 5. Mai 2021, 00:16
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810
Applikationen: OpenVPN

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1338961818663836945==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R
Content-Type: multipart/mixed;
boundary="tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <48dce7d8-7eae-4100-30ed-b0f161028652@canonical.com>
Subject: [USN-4933-1] OpenVPN vulnerabilities

--tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4933-1
May 04, 2021

openvpn vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

everal security issues were fixed in OpenVPN.

Software Description:
- openvpn: virtual private network software

Details:

It was discovered that OpenVPN incorrectly handled certain data channel v2
packets. A remote attacker could possibly use this issue to inject packets
using a victim's peer-id. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11810)

It was discovered that OpenVPN incorrectly handled deferred authentication.
When a server is configured to use deferred authentication, a remote
attacker could possibly use this issue to bypass authentication and access
control channel data. (CVE-2020-15078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
openvpn 2.5.1-1ubuntu1.1

Ubuntu 20.10:
openvpn 2.4.9-3ubuntu1.1

Ubuntu 20.04 LTS:
openvpn 2.4.7-1ubuntu2.20.04.2

Ubuntu 18.04 LTS:
openvpn 2.4.4-2ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4933-1
CVE-2020-11810, CVE-2020-15078

Package Information:
https://launchpad.net/ubuntu/+source/openvpn/2.5.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/openvpn/2.4.9-3ubuntu1.1
https://launchpad.net/ubuntu/+source/openvpn/2.4.7-1ubuntu2.20.04.2
https://launchpad.net/ubuntu/+source/openvpn/2.4.4-2ubuntu1.5


--tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5--

--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=dtFC
-----END PGP SIGNATURE-----

--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R--


--===============1338961818663836945==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============1338961818663836945==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung