‫בתאריך יום ו׳, 15 בנוב׳ 2024 ב-14:31 מאת נתי שטרן <‪nsh...@gmail.com‬‏>:‬

> Is it cve/vdp?
> Whether it is or not, I would appreciate it if you could guide me on how
> to develop a patch that will close the aforementioned loophole
>
>
> thanks,
>
> Netanel
>
> ‫בתאריך יום ה׳, 14 בנוב׳ 2024 ב-23:43 מאת ‪Gert Doering‬‏ <‪
> g...@greenie.muc.de‬‏>:‬
>
>> Hi,
>>
>> On Thu, Nov 14, 2024 at 10:12:35PM +0200, ?????? ???????? wrote:
>> > I am writing to responsibly disclose a vulnerability discovered during a
>> > black box penetration testing engagement. The vulnerability affects the
>> > OpenVPN client (v2.4.12, x86_64-pc-linux-gnu) and can lead to a
>> > denial-of-service (DoS) condition due to repeated TLS key negotiation
>> > timeouts.
>>
>> 2.4.x is end of everything since March 2022.
>>
>> The current stable branch is 2.6.x, and we do maintain 2.5.x for severe
>> bugs.
>>
>>   https://community.openvpn.net/openvpn/wiki/SupportedVersions
>>
>> Quite a bit of effort has been put into making the TLS handshake
>> (assuming tls-crypt-v2 is used) more robust in 2.6.0 - so if your
>> results are applicatble to 2.6.0 with tls-crypt-v2, we're happy to
>> listen.
>>
>> gert
>> --
>> "If was one thing all people took for granted, was conviction that if you
>>  feed honest figures into a computer, honest figures come out. Never
>> doubted
>>  it myself till I met a computer with a sense of humor."
>>                              Robert A. Heinlein, The Moon is a Harsh
>> Mistress
>>
>> Gert Doering - Munich, Germany
>> g...@greenie.muc.de
>>
>
>
> --
> <https://netanel.ml>
>


-- 
<https://netanel.ml>
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to