CVE-2020-11810 log

Source
Severity Medium
Remote Yes
Type Denial of service
Description
A security issue has been found in OpenVPN before 2.4.9, where a 'peer-id' check is not performed correctly during a small amount of time after a connection has been established. A rogue client sending a data channel packet during that time, from a different source address and with the same 'peer-id', would cause the client data to float to that new address, effectively sopping the VPN traffic of the first, legitimate client.
Group Package Affected Fixed Severity Status Ticket
AVG-1135 openvpn 2.4.8-4 2.4.9-1 Medium Fixed
Date Advisory Group Package Severity Type
17 Apr 2020 ASA-202004-16 AVG-1135 openvpn Medium denial of service
References
https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab
https://community.openvpn.net/openvpn/ticket/1272