CVE-2024-28882

NameCVE-2024-28882
DescriptionOpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1074488

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openvpn (PTS)jessie, jessie (lts)2.3.4-5+deb8u3fixed
stretch (security), stretch (lts), stretch2.4.0-6+deb9u4fixed
buster2.4.7-1+deb10u1fixed
bullseye2.5.1-3fixed
bookworm (security), bookworm2.6.3-1+deb12u2vulnerable
sid, trixie2.6.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openvpnsourcejessie(not affected)
openvpnsourcestretch(not affected)
openvpnsourcebuster(not affected)
openvpnsourcebullseye(not affected)
openvpnsource(unstable)2.6.11-11074488

Notes

[bookworm] - openvpn <no-dsa> (Minor issue)
[bullseye] - openvpn <not-affected> (Vulnerable code not present)
Introduced by: https://github.com/OpenVPN/openvpn/commit/d468dff7bdfd79059818c190ddf41b125bb658de (v2.6_beta1)
Fixed by: https://github.com/OpenVPN/openvpn/commit/65fb67cd6c320a426567b2922c4282fb8738ba3f (v2.6.11)
[buster] - openvpn <not-affected> (Vulnerable code not present)
[stretch] - openvpn <not-affected> (Vulnerable code not present)
[jessie] - openvpn <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems