USN-4933-1: OpenVPN vulnerabilities

Publication date

4 May 2021

Overview

Several security issues were fixed in OpenVPN.


Packages

  • openvpn - virtual private network software

Details

It was discovered that OpenVPN incorrectly handled certain data channel v2
packets. A remote attacker could possibly use this issue to inject packets
using a victim’s peer-id. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11810)

It was discovered that OpenVPN incorrectly handled deferred authentication.
When a server is configured to use deferred authentication, a remote
attacker could possibly use this issue to bypass authentication and access
control channel data. (CVE-2020-15078)

It was discovered that OpenVPN incorrectly handled certain data channel v2
packets. A remote attacker could possibly use this issue to inject packets
using a victim’s peer-id. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11810)

It was discovered that OpenVPN incorrectly handled deferred authentication.
When a server is configured to use deferred authentication, a remote
attacker could possibly use this issue to bypass authentication and access
control channel data. (CVE-2020-15078)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
21.04 hirsute openvpn –  2.5.1-1ubuntu1.1
20.10 groovy openvpn –  2.4.9-3ubuntu1.1
20.04 focal openvpn –  2.4.7-1ubuntu2.20.04.2
18.04 bionic openvpn –  2.4.4-2ubuntu1.5

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›