
oss-sec mailing list archives
CVE-2025-2704 - OpenVPN 2.6.1 through 2.6.13 with possible DoS
From: David Sommerseth <dazo () eurephia org>
Date: Wed, 2 Apr 2025 23:36:41 +0200
The OpenVPN community has released OpenVPN 2.6.14 which includes a critical security fix. This issue is fixed in OpenVPN 2.6.14 which has been released today. ----------------------------------------------------------------- CVE-2025-2704: Fix possible ASSERT() on OpenVPN servers using --tls-crypt-v2 OpenVPN servers between 2.6.1 and 2.6.13 using --tls-crypt-v2 can be made to abort with an ASSERT() message by sending a particular combination of authenticated and malformed packets. To trigger the bug, a valid tls-crypt-v2 client key is needed, or network observation of a handshake with a valid tls-crypt-v2 client key. No crypto integrity is violated, no data is leaked, and no remote code execution is possible. This bug does not affect OpenVPN clients. (Bug found by internal QA at OpenVPN Inc) ----------------------------------------------------------------- <https://community.openvpn.net/openvpn/wiki/Downloads#OpenVPN2.6.14--Released02April2025> <https://community.openvpn.net/openvpn/wiki/CVE-2025-2704> <https://www.cve.org/CVERecord?id=CVE-2025-2704> -- kind regards, David Sommerseth OpenVPN Inc
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
Current thread:
- CVE-2025-2704 - OpenVPN 2.6.1 through 2.6.13 with possible DoS David Sommerseth (Apr 02)