OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.
{ "ubuntu_priority": "medium" }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.12-0ubuntu0.20.04.2", "binary_name": "openvpn" }, { "binary_version": "2.4.12-0ubuntu0.20.04.2", "binary_name": "openvpn-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.5.9-0ubuntu0.22.04.3", "binary_name": "openvpn" }, { "binary_version": "2.5.9-0ubuntu0.22.04.3", "binary_name": "openvpn-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.6.11-1ubuntu1", "binary_name": "openvpn" }, { "binary_version": "2.6.11-1ubuntu1", "binary_name": "openvpn-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.6.9-1ubuntu4.1", "binary_name": "openvpn" }, { "binary_version": "2.6.9-1ubuntu4.1", "binary_name": "openvpn-dbgsym" } ] }