Your message dated Sun, 07 Jul 2024 23:07:17 +0000
with message-id <[email protected]>
and subject line Bug#1074488: fixed in openvpn 2.6.11-1
has caused the Debian Bug report #1074488,
regarding openvpn: CVE-2024-5594 CVE-2024-28882
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1074488: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074488
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: openvpn
Version: 2.6.9-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerabilities were published for openvpn, they are
said to be fixed in 2.6.11 but otherwise there is not much
information, can you research?
CVE-2024-5594[0] and CVE-2024-28882[1].
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2024-5594
https://www.cve.org/CVERecord?id=CVE-2024-5594
[1] https://security-tracker.debian.org/tracker/CVE-2024-28882
https://www.cve.org/CVERecord?id=CVE-2024-28882
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: openvpn
Source-Version: 2.6.11-1
Done: Bernhard Schmidt <[email protected]>
We believe that the bug you reported is fixed in the latest version of
openvpn, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bernhard Schmidt <[email protected]> (supplier of updated openvpn package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 08 Jul 2024 00:06:59 +0200
Source: openvpn
Architecture: source
Version: 2.6.11-1
Distribution: unstable
Urgency: medium
Maintainer: Bernhard Schmidt <[email protected]>
Changed-By: Bernhard Schmidt <[email protected]>
Closes: 1074488 1074504
Changes:
openvpn (2.6.11-1) unstable; urgency=medium
.
* New upstream version 2.6.11 (Closes: #1074488)
- CVE-2024-28882
client can circumvent management client-kill
- CVE-2024-5594
malicious peer can DoS or send garbage to logs
* d/[email protected]: Add CAP_SETPCAP required for openvpn-dco-dkms
(Closes: #1074504)
* drop d/patches/systemd.patch, applied upstream
Checksums-Sha1:
375e59b5def7975291ea67b36b81e280c8bfb220 2215 openvpn_2.6.11-1.dsc
8b65c39dae2fad6e870825cd7a3abcb4da5eccb4 1907454 openvpn_2.6.11.orig.tar.gz
b0f67514b57a42d2f795a0c4ad14feb3ac17701a 59408 openvpn_2.6.11-1.debian.tar.xz
28042b817fcc7a54142fb22155fe9eeb5b5e78f9 7515 openvpn_2.6.11-1_amd64.buildinfo
Checksums-Sha256:
8e6ca12db259e544bd12e09ac216ef6d177f141b97265f9e29cf78a94da7df23 2215
openvpn_2.6.11-1.dsc
d60adf413d37e11e6e63531cacf2655906756046b4edffe88a13b9e2fec40d5e 1907454
openvpn_2.6.11.orig.tar.gz
45e2cf34e0ed6cbc2fe696dc4efaa056b0f5bcc665e5fbd52989a136c88c2712 59408
openvpn_2.6.11-1.debian.tar.xz
abdd16862ba526a192282977441ec0ebf6d5cf57fedd74da73e5e30d39ced602 7515
openvpn_2.6.11-1_amd64.buildinfo
Files:
04ec1278d5c5fac6d455dafb08411fa3 2215 net optional openvpn_2.6.11-1.dsc
467b270c54955681add7f253aa03fc5a 1907454 net optional
openvpn_2.6.11.orig.tar.gz
bad6dba7daa9a99d4a7ac7d903a1d77d 59408 net optional
openvpn_2.6.11-1.debian.tar.xz
5cbd2a8122de08f02f0b95416518252c 7515 net optional
openvpn_2.6.11-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=j0eG
-----END PGP SIGNATURE-----
pgpIh0gSzhPfz.pgp
Description: PGP signature
--- End Message ---