summaryrefslogtreecommitdiffstats
path: root/meta-python/README
diff options
context:
space:
mode:
authorMeenali Gupta <meenali.gupta@windriver.com>2024-06-21 06:35:37 +0000
committerArmin Kuster <akuster808@gmail.com>2024-06-27 11:21:22 -0400
commitcfcc9f99456a4c51594eebb859621752ea0bd906 (patch)
treed198bd88ab99313de338511829ff716b536d9f62 /meta-python/README
parent38a07ce40ec6b167d135467aa9737c36a674b60e (diff)
downloadmeta-openembedded-cfcc9f99456a4c51594eebb859621752ea0bd906.tar.gz
openvpn: fix multiple CVEs
CVE-2024-24974: Previously, the VPN tool’s Windows implementation allowed remote access to its service pipe, posing a security risk. Using compromised credentials, a threat actor could communicate with OpenVPN to orchestrate attacks. CVE-2024-27903: OpenVPN has mitigated the risk by restricting plugin load. Plugins can now only be loaded from the software’s install directory, the Windows system directory, and the plugin_dir directory under the software’s installation. CVE-2024-27459: This vulnerability affects the interactive service component, potentially leading to local privilege escalation when triggered by an oversized message.To mitigate this risk, the VPN solution now terminates connections upon detecting excessively large messages, preventing stack overflow exploits. References: https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/ https://socradar.io/openvpn-fixed-multiple-vulnerabilities-on-windows/ https://community.openvpn.net/openvpn/wiki/CVE-2024-27903 https://community.openvpn.net/openvpn/wiki/CVE-2024-27459 https://community.openvpn.net/openvpn/wiki/CVE-2024-24974 Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/README')
0 files changed, 0 insertions, 0 deletions