** Description changed:
This bug tracks an update for the OpenVPN package, moving to versions:
* Plucky (25.04): OpenVPN 2.6.14
* Oracular (24.10): OpenVPN 2.6.14
* Noble (24.04): OpenVPN 2.6.14
* Jammy (22.04): OpenVPN 2.5.11
- Note that openvpn does not have an accepted micro-release exception.
- However, the SRU team has agreed to consider further releases given a
- full knowledge and possible mitigation of backwards-incompatible
- changes. See https://lists.ubuntu.com/archives/ubuntu-
- release/2023-July/005688.html
+ This update includes bugfixes following the SRU policy exception defined
+ at https://wiki.ubuntu.com/OpenVPNUpdates. Note that OpenVPN does not
+ have an accepted exception. However, the SRU team has agreed to consider
+ further releases given a full knowledge and possible mitigation of
+ backwards-incompatible changes. See
+ https://lists.ubuntu.com/archives/ubuntu-release/2023-July/005688.html
[Upstream Changes]
2.6.13-2.6.14
Updates:
Send uname() release from client to server as IV_PLAT_VER=
Pass --timeout=0 argument to systemd-ask-password, to avoid default timeout
of 90 seconds
Bug Fixes:
Repair source IP selection for --multihome
Allow tls-crypt-v2 to be setup only on initial packet of a session to fix
internal server error
Fix some missing spaces in messages
Fix parsing of usernames or passwords longer than USER_PASS_LEN on the server
side to avoid IV variable misparsing and misleading errors
Purge proxy authentication credentials from memory after use (if
--auth-nocache is in use)
-
CVE Fix - already available as patch:
CVE-2025-2704
+ The upstream changelog is available at
+ https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn26
[Test Plan]
DEP-8 Tests:
server-setup-with-ca - creates and tests an OpenVPN server setup with its own
certificate authority
server-setup-with-static-key - creates and tests an OpenVPN server setup
using a static key for authentication
+
+ See https://wiki.ubuntu.com/OpenVPNUpdates#QA for additional testing
+ information.
[Regression Potential]
Upstream has an extensive build and integration test suite. So
regressions would likely arise from a change in interaction with Ubuntu-
specific integrations.
Backwards-incompatible changes:
Refuse clients if username or password is longer than USER_PASS_LEN -
https://github.com/OpenVPN/openvpn/commit/b98ff0e7c60c6592a2e8d2c80dfd5999e5d2e65b
Overly long usernames and/or passwords are now refused by the server which is
backwards incompatible from previous versions when they were accepted. However,
when they were accepted, the rest of the packet was read improperly and would
not work as intended, likely returning a misleading error.
+
+ [Other Info]
+
+ Previous backports:
+ (LP: #2004676)
+ (LP: #2073318)
** Summary changed:
- MRE updates of openvpn for questing
+ Backport upstream microreleases for questing cycle
** Also affects: openvpn (Ubuntu Questing)
Importance: Undecided
Assignee: Lena Voytek (lvoytek)
Status: In Progress
** Changed in: openvpn (Ubuntu Questing)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2040467
Title:
Backport upstream microreleases for questing cycle
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/2040467/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs