In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:unstable
openvpn
to version 2.6.14-1 or higher.
Note: Versions mentioned in the description apply only to the upstream openvpn
package and not the openvpn
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase