First published: Thu Apr 03 2025(Updated: )
It was discovered that OpenVPN incorrectly handled certain malformed packets. A remote attacker could possibly use this issue to cause OpenVPN to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openvpn | <2.6.12-1ubuntu1.2 | 2.6.12-1ubuntu1.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/openvpn | <2.6.12-0ubuntu0.24.04.3 | 2.6.12-0ubuntu0.24.04.3 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7411-1 is categorized as a denial of service vulnerability due to OpenVPN's improper handling of malformed packets.
To fix USN-7411-1, update OpenVPN to version 2.6.12-1ubuntu1.2 or later for Ubuntu 24.10, or to version 2.6.12-0ubuntu0.24.04.3 or later for Ubuntu 24.04.
Yes, a remote attacker can exploit USN-7411-1 to cause OpenVPN to crash, leading to a denial of service.
OpenVPN versions prior to 2.6.12-1ubuntu1.2 for Ubuntu 24.10 and 2.6.12-0ubuntu0.24.04.3 for Ubuntu 24.04 are affected by USN-7411-1.
There is no official workaround for USN-7411-1; updating to the patched version is recommended to ensure security.