Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenVPN
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenVPN
ID: USN-7340-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
Datum: Di, 11. März 2025, 07:07
Referenzen: https://www.cve.org/CVERecord?id=CVE-2017-12166
https://www.cve.org/CVERecord?id=CVE-2024-5594
Applikationen: OpenVPN

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4889775042857103983==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------l4AO3T5UgqurxhxXS9qFF20D"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------l4AO3T5UgqurxhxXS9qFF20D
Content-Type: multipart/mixed;
boundary="------------AXT3e7LPnrM4Pkcmx0MWXhwX";
protected-headers="v1"
From: Nico Campuzano <nicolas.campuzano@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <68091c71-b7d0-4ba5-9e7b-22281193f078@canonical.com>
Subject: [USN-7340-1] OpenVPN vulnerabilities

--------------AXT3e7LPnrM4Pkcmx0MWXhwX
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7340-1
March 11, 2025

openvpn vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenVPN.

Software Description:
- openvpn: virtual private network software

Details:

It was discovered that OpenVPN did not perform proper input validation
when generating a TLS key under certain configuration, which could lead to
a buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS. (CVE-2017-12166)

Reynir Björnsson discovered that OpenVPN incorrectly handled certain
control channel messages with nonprintable characters. A remote attacker
could possibly use this issue to cause OpenVPN to consume resources, or
fill up log files with garbage, leading to a denial of service.
(CVE-2024-5594)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
openvpn 2.4.4-2ubuntu1.7+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
openvpn 2.3.10-1ubuntu2.2+esm2
Available with Ubuntu Pro

Ubuntu 14.04 LTS
openvpn 2.3.2-7ubuntu3.2+esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7340-1
CVE-2017-12166, CVE-2024-5594

--------------AXT3e7LPnrM4Pkcmx0MWXhwX--

--------------l4AO3T5UgqurxhxXS9qFF20D
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsF5BAABCAAjFiEEKl1CaPno2Qy4/AU8lFzKVeTWQe4FAmfPtIAFAwAAAAAACgkQlFzKVeTWQe66
qRAAkpGDIdXqtVET6b3mq3TEBguueLTSpCxC2y1szhBqjNZVnaNQ3/weRxVL7k8ogQEbpYpNiTX3
QquIL8yhs6Fz+CdlRyML1P6WLfxnIkSmYuhXE0u1xJOzIYWDoKlDEQN+zk5N8gIAF+SjsWmEMoh1
HL+Nu059dqVP/Cp1UQpc9006cV19WZ6DLRjKGK4OndO9mYvvF13of3DefxglBBD+o8i4YJeKOzZM
t7Dwv+PRNPOnLxfrWqNUzvVQ92Gik0bY27ta41Gr1Z7Ckc3050imFlFIUAdT14oIDzl1f2XZ4qZR
zQAacbfg1IotJYVDLyKKBYvr3lu+c2+tWIfPyblyOeRlwo29tbRJ9ekWbchlAUBjKdD/ahcXw5lS
e+J9oCvjl36syosfraaQEJjfo7aKj20GQhoQ1KuZyn7TfFL/pY3kUp6Wqooh4K2lnisaoKxKHJii
uBEtTijcmlfamWB2GUP4FEvtWW8MdPR3GOwzDlHYu2hnGfNNyfYyVXnvoRDAovtQOFFFvcOZ2oLN
N1k0muoUYXFmi9sUBtLoT59E1dQ1kQTqXWTH47CTAXVqzsa4G2xt8upk5dLPbZHZC8Md2yWQNcU4
xHsRltz/z4D2WhfhUF7Ozo1E0Np1Jc/obu/dxXBZ31u/unkQHCTDaqPkIEa01qIZHEvowGxavSOb
ung=
=Q2eI
-----END PGP SIGNATURE-----

--------------l4AO3T5UgqurxhxXS9qFF20D--


--===============4889775042857103983==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============4889775042857103983==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung