The OpenVPN community has released OpenVPN 2.6.14 which includes a
critical security fix.

This issue is fixed in OpenVPN 2.6.14 which has been released today.

-----------------------------------------------------------------
CVE-2025-2704: Fix possible ASSERT() on OpenVPN servers
               using --tls-crypt-v2

OpenVPN servers between 2.6.1 and 2.6.13 using --tls-crypt-v2 can be
made to abort with an ASSERT() message by sending a particular
combination of authenticated and malformed packets.

To trigger the bug, a valid tls-crypt-v2 client key is needed, or
network observation of a handshake with a valid tls-crypt-v2 client key.

No crypto integrity is violated, no data is leaked, and no remote code
execution is possible.  This bug does not affect OpenVPN clients.

(Bug found by internal QA at OpenVPN Inc)
-----------------------------------------------------------------

<https://community.openvpn.net/openvpn/wiki/Downloads#OpenVPN2.6.14--Released02April2025>
<https://community.openvpn.net/openvpn/wiki/CVE-2025-2704>
<https://www.cve.org/CVERecord?id=CVE-2025-2704>

-- 
kind regards,

David Sommerseth
OpenVPN Inc

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to