CVE-2025-12106

NameCVE-2025-12106
DescriptionInsufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openvpn (PTS)bullseye2.5.1-3fixed
bullseye (security)2.5.1-3+deb11u2fixed
bookworm2.6.3-1+deb12u3fixed
bookworm (security)2.6.3-1+deb12u4fixed
trixie2.6.14-1fixed
trixie (security)2.6.14-1+deb13u1fixed
forky, sid2.7.0~rc3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openvpnsource(unstable)(not affected)

Notes

- openvpn <not-affected> (Vulnerable code only in 2.7 upstream)
https://community.openvpn.net/Security%20Announcements/CVE-2025-12106

Search for package or bug name: Reporting problems