This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1338961818663836945==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R
Content-Type: multipart/mixed; boundary="tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: "ubuntu-security-announce@lists.ubuntu.com"
Message-ID: <48dce7d8-7eae-4100-30ed-b0f161028652@canonical.com>
Subject: [USN-4933-1] OpenVPN vulnerabilities
--tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-4933-1
May 04, 2021
openvpn vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
everal security issues were fixed in OpenVPN.
Software Description:
- openvpn: virtual private network software
Details:
It was discovered that OpenVPN incorrectly handled certain data channel v2
packets. A remote attacker could possibly use this issue to inject packets
using a victim's peer-id. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11810)
It was discovered that OpenVPN incorrectly handled deferred authentication.
When a server is configured to use deferred authentication, a remote
attacker could possibly use this issue to bypass authentication and access
control channel data. (CVE-2020-15078)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
openvpn 2.5.1-1ubuntu1.1
Ubuntu 20.10:
openvpn 2.4.9-3ubuntu1.1
Ubuntu 20.04 LTS:
openvpn 2.4.7-1ubuntu2.20.04.2
Ubuntu 18.04 LTS:
openvpn 2.4.4-2ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-4933-1
CVE-2020-11810, CVE-2020-15078
Package Information:
https://launchpad.net/ubuntu/+source/openvpn/2.5.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/openvpn/2.4.9-3ubuntu1.1
https://launchpad.net/ubuntu/+source/openvpn/2.4.7-1ubuntu2.20.04.2
https://launchpad.net/ubuntu/+source/openvpn/2.4.4-2ubuntu1.5
--tkbuHEt4ACoXvb8xFqRZgAn0pgzycjXn5--
--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----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=dtFC
-----END PGP SIGNATURE-----
--BhOk4S0jnoNr4SA2vWxDSZAiiKWmxzK0R--
--===============1338961818663836945==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============1338961818663836945==--
|