Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Ubuntu » OpenVPN vulnerabilities

OpenVPN vulnerabilities

  • Vendor: Ubuntu
  • Vendor ID: USN-3284-1
  • Date: May 11, 2017


==========================================================================
Ubuntu Security Notice USN-3284-1
May 11, 2017

openvpn vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04

Summary:

Several security issues were fixed in OpenVPN.

Software Description:
- openvpn: virtual private network software

Details:

It was discovered that OpenVPN improperly triggered an assert when
receiving an oversized control packet in some situations. A remote
attacker could use this to cause a denial of service (server or client
crash). (CVE-2017-7478)

It was discovered that OpenVPN improperly triggered an assert when packet
ids rolled over. An authenticated remote attacker could use this to cause a
denial of service (application crash). (CVE-2017-7479)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
openvpn 2.4.0-4ubuntu1.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3284-1
CVE-2017-7478, CVE-2017-7479

Package Information:
https://launchpad.net/ubuntu/+source/openvpn/2.4.0-4ubuntu1.2

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170511/38a1c410/attachment.pgp>

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »