Mageia 2021-0302: openvpn security update | LinuxSecurity.com

Advisories

MGASA-2021-0302 - Updated openvpn packages fix a security vulnerability

Publication date: 29 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0302.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2020-15078

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass
authentication and access control channel data on servers configured with
deferred authentication, which can be used to potentially trigger further
information leaks (CVE-2020-15078).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29007
- https://ubuntu.com/security/notices/USN-4933-1
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078

SRPMS:
- 7/core/openvpn-2.4.9-1.1.mga7
- 8/core/openvpn-2.5.0-2.1.mga8

Mageia 2021-0302: openvpn security update

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can ...

Summary

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks (CVE-2020-15078).

References

- https://bugs.mageia.org/show_bug.cgi?id=29007

- https://ubuntu.com/security/notices/USN-4933-1

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078

Resolution

MGASA-2021-0302 - Updated openvpn packages fix a security vulnerability

SRPMS

- 7/core/openvpn-2.4.9-1.1.mga7

- 8/core/openvpn-2.5.0-2.1.mga8

Severity
Publication date: 29 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0302.html
Type: security
CVE: CVE-2020-15078

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.