ArchLinux: 201412-2: openvpn: denial of service
Summary
It was discovered that an authenticated client could trigger an ASSERT() in OpenVPN by sending a too-short control channel packet to the server. This could cause the OpenVPN server to crash and deny access to the VPN to other legitimate users.
Resolution
Upgrade to 2.3.6-1.
# pacman -Syu "openvpn>=2.3.6-1"
The problem has been fixed upstream [0] in version 2.3.6.
References
[0] https://github.com/OpenVPN/openvpn/commit/c5590a https://access.redhat.com/security/cve/CVE-2014-8104 https://bugs.archlinux.org/task/42975
Workaround
None.