Source: openvpn
Version: 2.6.3-2.1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for openvpn.

CVE-2023-46849[0]:
| Using the --fragment option in certain configuration setups OpenVPN
| version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by
| zero behaviour which could cause an application crash, leading to a
| denial of service.


CVE-2023-46850[1]:
| Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to
| undefined behavoir, leaking memory buffers or remote execution when
| sending network buffers to a remote peer.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-46849
    https://www.cve.org/CVERecord?id=CVE-2023-46849
[1] https://security-tracker.debian.org/tracker/CVE-2023-46850
    https://www.cve.org/CVERecord?id=CVE-2023-46850
[2] https://community.openvpn.net/openvpn/wiki/CVE-2023-46849
[3] https://community.openvpn.net/openvpn/wiki/CVE-2023-46850

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to