UbuntuUpdates.org

Package "openvpn"


Moved to focal:main:updates


Name: openvpn

Description:

virtual private network daemon

Latest version: *DELETED*
Release: focal (20.04)
Level: proposed
Repository: main
Homepage: https://openvpn.net/

Links


Download "openvpn"


Other versions of "openvpn" in Focal

Repository Area Version
base main 2.4.7-1ubuntu2
security main 2.4.7-1ubuntu2.20.04.4
updates main 2.4.12-0ubuntu0.20.04.1

Changelog

Version: *DELETED* 2023-12-03 07:07:02 UTC
Moved to focal:main:updates
No changelog for deleted or moved packages.

Version: 2.4.12-0ubuntu0.20.04.1 2023-11-21 20:06:54 UTC

  openvpn (2.4.12-0ubuntu0.20.04.1) focal; urgency=medium

  * New upstream releases 2.4.8-2.4.12 (LP: #2004676)
    - The version is being updated to the latest in 2.4.x rather than 2.6.x to
      avoid feature releases and focus on bug fixes
    - Updates:
      + Support compiling with OpenSSL 1.1 without deprecated APIs
      + Handle PSS padding in cryptoapicert (necessary for TLS >= 1.2)
      + Client will now announce the acceptable ciphers to the server
        (IV_CIPHER=...), so NCP cipher negotiation works better
    - Bug Fixes Include:
      + CVE-2020-11810
      + CVE-2020-15078
      + CVE-2022-0547
      + Fix "--mtu-disc maybe|yes"
      + Fix argv leaks in add_route() and add_route_ipv6()
      + Ensure the current common_name is in the environment for scripts
      + Apply connect-retry backoff only to one side of the connection for p2p
      + Fix PIN querying in systemd environments
      + Fix condition where a client's session could float to a new IP address
        that is not authorized
      + Fix combination of async push and NCP
      + Fix OpenSSL error stack handling of tls_ctx_add_extra_certs
      + Fix broken fragmentation logic when using NCP
      + Fix handling of 'route remote_host' for IPv6 transport case
      + Fix fatal error at switching remotes
      + See https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24 for
        additional bug fixes and information
  * Remove patches fixed upstream:
    - fix-pkcs11-helper-hang.patch
    - increase-listen-backlog-queue-to-32.patch
      [Included in upstream release 2.4.8]
    - CVE-2020-11810.patch
      [Included in upstream release 2.4.9]
    - CVE-2020-15078.patch
      [Included in upstream release 2.4.11]
    - CVE-2022-0547.patch
      [Included in upstream release 2.4.12]
  * Add DEP-8 tests from later releases
    - d/t/server-setup-with-static-key: test the OpenVPN server side setup
      using a static key.
    - d/t/server-setup-with-ca: test the OpenVPN server side setup using a
      CA built with easy-rsa.
    - The tests match those seen in Jammy and later with the exception of
      checking for /sbin/ip commands instead of net_... commands

 -- Lena Voytek <email address hidden> Mon, 21 Aug 2023 11:08:59 -0700

2004676 MRE Updates 2.5.8 / 2.4.11
CVE-2020-11810 An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally
CVE-2020-15078 OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with defe
CVE-2022-0547 OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of def

Version: *DELETED* 2021-08-12 16:06:15 UTC
Moved to focal:main:updates
No changelog for deleted or moved packages.

Version: 2.4.7-1ubuntu2.20.04.3 2021-07-28 10:06:18 UTC

  openvpn (2.4.7-1ubuntu2.20.04.3) focal; urgency=medium

  * d/p/increase-listen-backlog-queue-to-32.patch: Increase listen backlog queue
    to 32 (LP: #1934781)

 -- Athos Ribeiro <email address hidden> Mon, 19 Jul 2021 16:26:19 -0300

1934781 TCP socket backlog set too low (\

Version: *DELETED* 2021-05-10 10:06:20 UTC
Moved to focal:main:updates
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates