Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/openvpn@0?distro=trixie
purl pkg:deb/debian/openvpn@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (15)
Vulnerability Summary Aliases
VCID-28zy-wt9q-5udk The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service. CVE-2024-24974
VCID-5wv8-4q5c-4fev OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe). CVE-2021-3606
VCID-6h6c-h3va-dbfk OpenVPN 2.7_alpha1 through 2.7_beta1 on POSIX based platforms allows a remote authenticated server to inject shell commands via DNS variables when --dns-updown is in use CVE-2025-10680
VCID-7k7e-z4tf-6uc4 Multiple vulnerabilities have been discovered in OpenVPN, the worst of which could lead to information disclosure. CVE-2023-46850
VCID-9ymq-r7r1-4uh9 openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation. CVE-2018-9336
VCID-ayrd-g1eb-h3dt OpenVPN: OpenVPN: Local denial of service vulnerability in interactive service agent CVE-2025-13751
VCID-hr11-3ew1-4fgk OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase CVE-2025-2704
VCID-junc-6y8j-cbe2 OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session CVE-2024-28882
VCID-pspa-n4yc-j7hr The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges. CVE-2024-27459
VCID-qw3z-yr6x-2uhd OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service. CVE-2024-27903
VCID-qwa7-cv2s-53hp Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses CVE-2025-12106
VCID-rprb-r52n-7ygu OpenVPN: OpenVPN: Improper validation of source IP addresses leads to denial of service CVE-2025-13086
VCID-ttj5-upnp-3qfd Multiple vulnerabilities have been discovered in OpenVPN, the worst of which could lead to information disclosure. CVE-2023-46849
VCID-w1eu-fbhk-pucv OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges CVE-2024-4877
VCID-xwnt-nju3-yybg Insufficient epoch key slot processing in OpenVPN 2.7_alpha1 through 2.7_rc5 allows remote authenticated users to trigger an assert resulting in a denial of service CVE-2025-15497

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:53:19.885162+00:00 Debian Importer Fixing VCID-6h6c-h3va-dbfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:06.857816+00:00 Debian Importer Fixing VCID-7k7e-z4tf-6uc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:00.374705+00:00 Debian Importer Fixing VCID-qw3z-yr6x-2uhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:37.591656+00:00 Debian Importer Fixing VCID-w1eu-fbhk-pucv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:41.469707+00:00 Debian Importer Fixing VCID-5wv8-4q5c-4fev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:27.754025+00:00 Debian Importer Fixing VCID-junc-6y8j-cbe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:39.850809+00:00 Debian Importer Fixing VCID-9ymq-r7r1-4uh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:02.321372+00:00 Debian Importer Fixing VCID-pspa-n4yc-j7hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:11.812211+00:00 Debian Importer Fixing VCID-xwnt-nju3-yybg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:33.463316+00:00 Debian Importer Fixing VCID-hr11-3ew1-4fgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:23.083136+00:00 Debian Importer Fixing VCID-ayrd-g1eb-h3dt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:25.903822+00:00 Debian Importer Fixing VCID-28zy-wt9q-5udk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:57.482656+00:00 Debian Importer Fixing VCID-rprb-r52n-7ygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:54.107439+00:00 Debian Importer Fixing VCID-ttj5-upnp-3qfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:36.249268+00:00 Debian Importer Fixing VCID-qwa7-cv2s-53hp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:06:58.818512+00:00 Debian Importer Fixing VCID-6h6c-h3va-dbfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:10.196442+00:00 Debian Importer Fixing VCID-7k7e-z4tf-6uc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:06.587363+00:00 Debian Importer Fixing VCID-qw3z-yr6x-2uhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:17.238156+00:00 Debian Importer Fixing VCID-w1eu-fbhk-pucv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:45.612822+00:00 Debian Importer Fixing VCID-5wv8-4q5c-4fev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:50.878227+00:00 Debian Importer Fixing VCID-junc-6y8j-cbe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:09.922209+00:00 Debian Importer Fixing VCID-9ymq-r7r1-4uh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:41.237266+00:00 Debian Importer Fixing VCID-pspa-n4yc-j7hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:07.960939+00:00 Debian Importer Fixing VCID-xwnt-nju3-yybg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:15.717032+00:00 Debian Importer Fixing VCID-hr11-3ew1-4fgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:35.987596+00:00 Debian Importer Fixing VCID-ayrd-g1eb-h3dt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:28.484207+00:00 Debian Importer Fixing VCID-28zy-wt9q-5udk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:35.206929+00:00 Debian Importer Fixing VCID-rprb-r52n-7ygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:57.811750+00:00 Debian Importer Fixing VCID-ttj5-upnp-3qfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:47.005929+00:00 Debian Importer Fixing VCID-qwa7-cv2s-53hp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:49:10.293931+00:00 Debian Importer Fixing VCID-hr11-3ew1-4fgk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:10.217530+00:00 Debian Importer Fixing VCID-xwnt-nju3-yybg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:10.170014+00:00 Debian Importer Fixing VCID-ayrd-g1eb-h3dt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:10.116431+00:00 Debian Importer Fixing VCID-rprb-r52n-7ygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:10.056141+00:00 Debian Importer Fixing VCID-qwa7-cv2s-53hp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:10.008662+00:00 Debian Importer Fixing VCID-6h6c-h3va-dbfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.890384+00:00 Debian Importer Fixing VCID-w1eu-fbhk-pucv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.836994+00:00 Debian Importer Fixing VCID-junc-6y8j-cbe2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.768980+00:00 Debian Importer Fixing VCID-qw3z-yr6x-2uhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.720845+00:00 Debian Importer Fixing VCID-pspa-n4yc-j7hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.673257+00:00 Debian Importer Fixing VCID-28zy-wt9q-5udk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.621214+00:00 Debian Importer Fixing VCID-7k7e-z4tf-6uc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.548123+00:00 Debian Importer Fixing VCID-ttj5-upnp-3qfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.412725+00:00 Debian Importer Fixing VCID-5wv8-4q5c-4fev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:09.259373+00:00 Debian Importer Fixing VCID-9ymq-r7r1-4uh9 https://security-tracker.debian.org/tracker/data/json 38.1.0