On 16/05/16 14:03, Gert Doering wrote:
> Hi,
> 
> On Sat, May 14, 2016 at 10:50:23AM +0200, Matthias Andree wrote:
>> Am 10.05.2016 um 12:06 schrieb Samuli Seppänen:
>>> The OpenVPN community project team is proud to release OpenVPN 2.3.11. 
>>> It can be downloaded from here:
>>>
>>> <http://openvpn.net/index.php/open-source/downloads.html>
>>>
>>> This release fixes two vulnerabilities: a port-share bug with DoS 
>>> potential and a buffer overflow by user supplied data when using pam 
>>> authentication. In addition a number of small fixes and improvements are 
>>> included. A full list of changes is available here:
>>>
>>> <https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23>
>>
>> I was wondering... do we have CVE references or similar unique
>> identifiers, which I could then use - for instance - in the FreeBSD
>> vulnerability database?
> 
> Not for these two - these sound scary, but are really edge cases that
> are very unlikely to be a problem for most users in practice.  So we
> didn't go out and fetch a CVS number - maybe we should have, but we're
> still learning.  And we need more people to do the routine chores, like,
> "organize proper handling of possibly security relevant patches"...
> 
> After release, I saw a note about Fedora issueing updates, which referenced
> "OPENVPN-2311-1" and "OPENVPN-2311-2" - though I'm not sure if these are
> Fedora-assigned or DFN-CERT...
> 
> https://portal.cert.dfn.de/adv/DFN-CERT-2016-0739/

AFAIK, those OPENVPN-2311-{1,2} numbers are created by dfn.de. I've
never heard, noticed or seen any traces of Fedora nor Red Hat requesting
any CVE numbers for these specific issues.

In hindsight I agree that we probably should have at least considered
asking for a CVE numbers in these cases.


-- 
kind regards,

David Sommerseth

Reply via email to