Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-2704 (GCVE-0-2025-2704)
Vulnerability from cvelistv5 – Published: 2025-04-02 21:00 – Updated: 2025-10-23 10:53
VLAI?
EPSS
Summary
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Severity ?
7.5 (High)
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-04-03T00:11:05.289Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/02/5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-2704",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-07T17:20:44.473236Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-07T17:23:59.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "OpenVPN",
"vendor": "OpenVPN",
"versions": [
{
"lessThanOrEqual": "2.6.13",
"status": "affected",
"version": "2.6.1",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T10:53:34.373Z",
"orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
"shortName": "OpenVPN"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2025-2704"
},
{
"tags": [
"release-notes"
],
"url": "https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00142.html"
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
"assignerShortName": "OpenVPN",
"cveId": "CVE-2025-2704",
"datePublished": "2025-04-02T21:00:58.582Z",
"dateReserved": "2025-03-24T10:26:42.493Z",
"dateUpdated": "2025-10-23T10:53:34.373Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-2704\",\"sourceIdentifier\":\"security@openvpn.net\",\"published\":\"2025-04-02T21:15:32.943\",\"lastModified\":\"2025-10-23T11:15:31.207\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase\"},{\"lang\":\"es\",\"value\":\"Las versiones 2.6.1 a 2.6.13 de OpenVPN en modo servidor que utilizan TLS-crypt-v2 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio al corromper y reproducir paquetes de red en la fase inicial del protocolo de enlace.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@openvpn.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"2.6.1\",\"versionEndIncluding\":\"2.6.13\",\"matchCriteriaId\":\"2BC16851-89DA-4AFB-96D2-AAF258DCF5DC\"}]}]}],\"references\":[{\"url\":\"https://community.openvpn.net/openvpn/wiki/CVE-2025-2704\",\"source\":\"security@openvpn.net\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00142.html\",\"source\":\"security@openvpn.net\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/04/02/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/04/02/5\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-03T00:11:05.289Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2704\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-07T17:20:44.473236Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-07T17:21:04.456Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"OpenVPN\", \"product\": \"OpenVPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.6.13\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://community.openvpn.net/openvpn/wiki/CVE-2025-2704\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754 Improper Check for Unusual or Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"36a55730-e66d-4d39-8ca6-3c3b3017965e\", \"shortName\": \"OpenVPN\", \"dateUpdated\": \"2025-04-02T21:00:58.582Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2704\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-07T17:23:59.009Z\", \"dateReserved\": \"2025-03-24T10:26:42.493Z\", \"assignerOrgId\": \"36a55730-e66d-4d39-8ca6-3c3b3017965e\", \"datePublished\": \"2025-04-02T21:00:58.582Z\", \"assignerShortName\": \"OpenVPN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CVE-2025-2704
Vulnerability from fstec - Published: 02.04.2025
VLAI Severity ?
Title
Уязвимость функции TLS-crypt-v2 сервера программного обеспечения OpenVPN, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции TLS-crypt-v2 сервера программного обеспечения OpenVPN связана с недостаточной проверкой необычных или исключительных состояний. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
ООО «Ред Софт», АО «ИВК», ООО «РусБИТех-Астра», Сообщество свободного программного обеспечения
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), АЛЬТ СП 10, Astra Linux Special Edition (запись в едином реестре российских программ №369), OpenVPN
Software Version
7.3 (РЕД ОС), - (АЛЬТ СП 10), 1.8 (Astra Linux Special Edition), от 2.6.1 до 2.6.14 (OpenVPN), 3.8 (Astra Linux Special Edition)
Possible Mitigations
Использование рекомендаций:
https://community.openvpn.net/openvpn/wiki/CVE-2025-2704
Для РЕД ОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/?sphrase_id=966120
Для ОС Astra Linux:
обновить пакет openvpn до 2.6.3-1+deb12u3+ci1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD
Для ОС АЛЬТ СП 10: установка обновления из публичного репозитория программного средства: https://altsp.su/obnovleniya-bezopasnosti/
Для ОС Astra Linux:
обновить пакет openvpn до 2.6.3-1+deb12u3+ci1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
Для ОС Astra Linux:
обновить пакет openvpn до 2.6.3-1+deb12u3+ci1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
Reference
https://vuldb.com/de/?id.303087
http://www.openwall.com/lists/oss-security/2025/04/02/5
https://community.openvpn.net/openvpn/wiki/CVE-2025-2704
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/?sphrase_id=966120
https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD
https://altsp.su/obnovleniya-bezopasnosti/
https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
CWE
CWE-754
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), 1.8 (Astra Linux Special Edition), \u043e\u0442 2.6.1 \u0434\u043e 2.6.14 (OpenVPN), 3.8 (Astra Linux Special Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://community.openvpn.net/openvpn/wiki/CVE-2025-2704\n\n\u0414\u043b\u044f \u0420\u0415\u0414 \u041e\u0421:\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/?sphrase_id=966120\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u041b\u042c\u0422 \u0421\u041f 10: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "02.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.04.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-05051",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-2704",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041b\u042c\u0422 \u0421\u041f 10, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), OpenVPN",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 3.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 TLS-crypt-v2 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f OpenVPN, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043d\u0435\u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u0438\u043b\u0438 \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0439 (CWE-754)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 TLS-crypt-v2 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f OpenVPN \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043d\u0435\u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u0438\u043b\u0438 \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/de/?id.303087\nhttp://www.openwall.com/lists/oss-security/2025/04/02/5\t\nhttps://community.openvpn.net/openvpn/wiki/CVE-2025-2704\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/?sphrase_id=966120\nhttps://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-754",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,6)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,7)"
}
WID-SEC-W-2025-0694
Vulnerability from csaf_certbund - Published: 2025-04-02 22:00 - Updated: 2025-06-09 22:00Summary
OpenVPN: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenVPN ist eine Open Source Software zum Aufbau eines Virtuellen Privaten Netzwerkes (VPN) über eine verschlüsselte TLS-Verbindung. Zur Verschlüsselung werden die Bibliotheken des Programmes OpenSSL benutzt.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenVPN ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenVPN ist eine Open Source Software zum Aufbau eines Virtuellen Privaten Netzwerkes (VPN) \u00fcber eine verschl\u00fcsselte TLS-Verbindung. Zur Verschl\u00fcsselung werden die Bibliotheken des Programmes OpenSSL benutzt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenVPN ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0694 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0694.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0694 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0694"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-04-02",
"url": "https://github.com/advisories/GHSA-5gwv-2q72-gxrm"
},
{
"category": "external",
"summary": "OpenVPN Wiki vom 2025-04-02",
"url": "https://community.openvpn.net/openvpn/wiki/Downloads#OpenVPN2.6.14--Released02April2025"
},
{
"category": "external",
"summary": "OSS Security Mailing List vom 2025-04-02",
"url": "https://seclists.org/oss-sec/2025/q2/8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7411-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7411-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1508-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01508-1 vom 2025-06-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021425.html"
}
],
"source_lang": "en-US",
"title": "OpenVPN: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-06-09T22:00:00.000+00:00",
"generator": {
"date": "2025-06-10T08:25:30.830+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0694",
"initial_release_date": "2025-04-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-07T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.6.14",
"product": {
"name": "Open Source OpenVPN \u003c2.6.14",
"product_id": "T042350"
}
},
{
"category": "product_version",
"name": "2.6.14",
"product": {
"name": "Open Source OpenVPN 2.6.14",
"product_id": "T042350-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openvpn:openvpn:2.6.14"
}
}
}
],
"category": "product_name",
"name": "OpenVPN"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2704",
"product_status": {
"known_affected": [
"T002207",
"T000126",
"T042350"
]
},
"release_date": "2025-04-02T22:00:00.000+00:00",
"title": "CVE-2025-2704"
}
]
}
GHSA-5GWV-2Q72-GXRM
Vulnerability from github – Published: 2025-04-02 21:30 – Updated: 2025-10-23 12:31
VLAI?
Details
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2025-2704"
],
"database_specific": {
"cwe_ids": [
"CWE-754"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-04-02T21:15:32Z",
"severity": "HIGH"
},
"details": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase",
"id": "GHSA-5gwv-2q72-gxrm",
"modified": "2025-10-23T12:31:16Z",
"published": "2025-04-02T21:30:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2704"
},
{
"type": "WEB",
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2025-2704"
},
{
"type": "WEB",
"url": "https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00142.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/04/02/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2025:01508-1
Vulnerability from csaf_suse - Published: 2025-06-06 10:05 - Updated: 2025-06-06 10:05Summary
Security update for openvpn
Notes
Title of the patch
Security update for openvpn
Description of the patch
This update for openvpn fixes the following issues:
- CVE-2025-2704: Fixed remote DoS due to possible ASSERT() on OpenVPN servers using --tls-crypt-v2 (bsc#1240392)
Patchnames
SUSE-2025-1508,SUSE-SLE-Module-Basesystem-15-SP7-2025-1508
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openvpn",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openvpn fixes the following issues:\n\n- CVE-2025-2704: Fixed remote DoS due to possible ASSERT() on OpenVPN servers using --tls-crypt-v2 (bsc#1240392)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1508,SUSE-SLE-Module-Basesystem-15-SP7-2025-1508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01508-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:01508-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501508-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:01508-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040162.html"
},
{
"category": "self",
"summary": "SUSE Bug 1240392",
"url": "https://bugzilla.suse.com/1240392"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2704 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2704/"
}
],
"title": "Security update for openvpn",
"tracking": {
"current_release_date": "2025-06-06T10:05:10Z",
"generator": {
"date": "2025-06-06T10:05:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:01508-1",
"initial_release_date": "2025-06-06T10:05:10Z",
"revision_history": [
{
"date": "2025-06-06T10:05:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2704"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2704",
"url": "https://www.suse.com/security/cve/CVE-2025-2704"
},
{
"category": "external",
"summary": "SUSE Bug 1240392 for CVE-2025-2704",
"url": "https://bugzilla.suse.com/1240392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-06T10:05:10Z",
"details": "moderate"
}
],
"title": "CVE-2025-2704"
}
]
}
SUSE-SU-2025:1508-1
Vulnerability from csaf_suse - Published: 2025-05-07 14:02 - Updated: 2025-05-07 14:02Summary
Security update for openvpn
Notes
Title of the patch
Security update for openvpn
Description of the patch
This update for openvpn fixes the following issues:
- CVE-2025-2704: Fixed remote DoS due to possible ASSERT() on OpenVPN servers using --tls-crypt-v2 (bsc#1240392)
Patchnames
SUSE-2025-1508,SUSE-SLE-Module-Basesystem-15-SP6-2025-1508,openSUSE-SLE-15.6-2025-1508
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openvpn",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openvpn fixes the following issues:\n\n- CVE-2025-2704: Fixed remote DoS due to possible ASSERT() on OpenVPN servers using --tls-crypt-v2 (bsc#1240392)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1508,SUSE-SLE-Module-Basesystem-15-SP6-2025-1508,openSUSE-SLE-15.6-2025-1508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1508-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:1508-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251508-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:1508-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-May/039180.html"
},
{
"category": "self",
"summary": "SUSE Bug 1240392",
"url": "https://bugzilla.suse.com/1240392"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2704 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2704/"
}
],
"title": "Security update for openvpn",
"tracking": {
"current_release_date": "2025-05-07T14:02:51Z",
"generator": {
"date": "2025-05-07T14:02:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:1508-1",
"initial_release_date": "2025-05-07T14:02:51Z",
"revision_history": [
{
"date": "2025-05-07T14:02:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-dco-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-devel-2.6.8-150600.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2704"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2704",
"url": "https://www.suse.com/security/cve/CVE-2025-2704"
},
{
"category": "external",
"summary": "SUSE Bug 1240392 for CVE-2025-2704",
"url": "https://bugzilla.suse.com/1240392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-dco-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.17.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-07T14:02:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-2704"
}
]
}
OPENSUSE-SU-2025:14979-1
Vulnerability from csaf_opensuse - Published: 2025-04-09 00:00 - Updated: 2025-04-09 00:00Summary
openvpn-2.6.14-1.1 on GA media
Notes
Title of the patch
openvpn-2.6.14-1.1 on GA media
Description of the patch
These are all security issues fixed in the openvpn-2.6.14-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14979
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "openvpn-2.6.14-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the openvpn-2.6.14-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14979",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14979-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2704 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2704/"
}
],
"title": "openvpn-2.6.14-1.1 on GA media",
"tracking": {
"current_release_date": "2025-04-09T00:00:00Z",
"generator": {
"date": "2025-04-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14979-1",
"initial_release_date": "2025-04-09T00:00:00Z",
"revision_history": [
{
"date": "2025-04-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.14-1.1.aarch64",
"product": {
"name": "openvpn-2.6.14-1.1.aarch64",
"product_id": "openvpn-2.6.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.6.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.14-1.1.aarch64",
"product": {
"name": "openvpn-devel-2.6.14-1.1.aarch64",
"product_id": "openvpn-devel-2.6.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.6.14-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.14-1.1.ppc64le",
"product": {
"name": "openvpn-2.6.14-1.1.ppc64le",
"product_id": "openvpn-2.6.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.14-1.1.ppc64le",
"product": {
"name": "openvpn-devel-2.6.14-1.1.ppc64le",
"product_id": "openvpn-devel-2.6.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.6.14-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.14-1.1.s390x",
"product": {
"name": "openvpn-2.6.14-1.1.s390x",
"product_id": "openvpn-2.6.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.6.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.14-1.1.s390x",
"product": {
"name": "openvpn-devel-2.6.14-1.1.s390x",
"product_id": "openvpn-devel-2.6.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.14-1.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.s390x",
"product_id": "openvpn-down-root-plugin-2.6.14-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.14-1.1.x86_64",
"product": {
"name": "openvpn-2.6.14-1.1.x86_64",
"product_id": "openvpn-2.6.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.6.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.14-1.1.x86_64",
"product": {
"name": "openvpn-devel-2.6.14-1.1.x86_64",
"product_id": "openvpn-devel-2.6.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.14-1.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.6.14-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.14-1.1.aarch64"
},
"product_reference": "openvpn-2.6.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.14-1.1.ppc64le"
},
"product_reference": "openvpn-2.6.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.14-1.1.s390x"
},
"product_reference": "openvpn-2.6.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.14-1.1.x86_64"
},
"product_reference": "openvpn-2.6.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.s390x"
},
"product_reference": "openvpn-devel-2.6.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.aarch64"
},
"product_reference": "openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.ppc64le"
},
"product_reference": "openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.s390x"
},
"product_reference": "openvpn-down-root-plugin-2.6.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.x86_64"
},
"product_reference": "openvpn-down-root-plugin-2.6.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2704"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2704",
"url": "https://www.suse.com/security/cve/CVE-2025-2704"
},
{
"category": "external",
"summary": "SUSE Bug 1240392 for CVE-2025-2704",
"url": "https://bugzilla.suse.com/1240392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.14-1.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.14-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-2704"
}
]
}
cleanstart-2026-dc27717
Vulnerability from cleanstart
Published
2026-02-25 00:39
Modified
2026-02-24 09:23
Summary
OpenVPN version 2
Details
Multiple security vulnerabilities affect the pritunl package. OpenVPN version 2. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "pritunl"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.32.4528.97-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the pritunl package. OpenVPN version 2. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DC27717",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:39:42.192253Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DC27717.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-2704"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-87hc-h4r5-73f7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-hgf8-39gv-g3f2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2704"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "OpenVPN version 2",
"upstream": [
"CVE-2025-2704",
"GHSA-87hc-h4r5-73f7",
"GHSA-hgf8-39gv-g3f2"
]
}
FKIE_CVE-2025-2704
Vulnerability from fkie_nvd - Published: 2025-04-02 21:15 - Updated: 2025-10-23 11:15
Severity ?
Summary
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
"matchCriteriaId": "2BC16851-89DA-4AFB-96D2-AAF258DCF5DC",
"versionEndIncluding": "2.6.13",
"versionStartIncluding": "2.6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase"
},
{
"lang": "es",
"value": "Las versiones 2.6.1 a 2.6.13 de OpenVPN en modo servidor que utilizan TLS-crypt-v2 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio al corromper y reproducir paquetes de red en la fase inicial del protocolo de enlace."
}
],
"id": "CVE-2025-2704",
"lastModified": "2025-10-23T11:15:31.207",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-04-02T21:15:32.943",
"references": [
{
"source": "security@openvpn.net",
"tags": [
"Broken Link"
],
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2025-2704"
},
{
"source": "security@openvpn.net",
"url": "https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00142.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2025/04/02/5"
}
],
"sourceIdentifier": "security@openvpn.net",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "security@openvpn.net",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…