** Description changed:

  This bug tracks an update for the OpenVPN package, moving to versions:
  
  * Plucky (25.04): OpenVPN 2.6.14
  * Oracular (24.10): OpenVPN 2.6.14
  * Noble (24.04): OpenVPN 2.6.14
  * Jammy (22.04): OpenVPN 2.5.11
  
  Note that openvpn does not have an accepted micro-release exception.
  However, the SRU team has agreed to consider further releases given a
  full knowledge and possible mitigation of backwards-incompatible
  changes. See https://lists.ubuntu.com/archives/ubuntu-
  release/2023-July/005688.html
  
  [Upstream Changes]
  
+ 2.6.13-2.6.14
+ 
+ Updates:
+ 
+ Send uname() release from client to server as IV_PLAT_VER=
+ Pass --timeout=0 argument to systemd-ask-password, to avoid default timeout 
of 90 seconds
+ 
+ Bug Fixes:
+ 
+ Repair source IP selection for --multihome
+ Allow tls-crypt-v2 to be setup only on initial packet of a session to fix 
internal server error
+ Fix some missing spaces in messages
+ Fix parsing of usernames or passwords longer than USER_PASS_LEN on the server 
side to avoid IV variable misparsing and misleading errors
+ Purge proxy authentication credentials from memory after use (if 
--auth-nocache is in use)
+ 
+ 
+ CVE Fix - already available as patch:
+ 
+ CVE-2025-2704
+ 
+ 
  [Test Plan]
  
  DEP-8 Tests:
  server-setup-with-ca - creates and tests an OpenVPN server setup with its own 
certificate authority
  server-setup-with-static-key - creates and tests an OpenVPN server setup 
using a static key for authentication
  
  [Regression Potential]
  
  Upstream has an extensive build and integration test suite. So
  regressions would likely arise from a change in interaction with Ubuntu-
  specific integrations.
+ 
+ Backwards-incompatible changes:
+ 
+ Refuse clients if username or password is longer than USER_PASS_LEN - 
https://github.com/OpenVPN/openvpn/commit/b98ff0e7c60c6592a2e8d2c80dfd5999e5d2e65b
+ Overly long usernames and/or passwords are now refused by the server which is 
backwards incompatible from previous versions when they were accepted. However, 
when they were accepted, the rest of the packet was read improperly and would 
not work as intended, likely returning a misleading error.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2040467

Title:
  MRE updates of openvpn for questing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/2040467/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to