OpenVPN and Libcommons-Lang-Java updates for Debian

Published by

Two important security updates have been released for Debian 11 (Bullseye) to address vulnerabilities in OpenVPN and the libcommons-lang3-java package. The first advisory, DLA-4079-2, resolves a regression in OpenVPN that restricted certain characters in control channel messages. This fix allows the use of newline ("\n") and carriage return ("\r") characters, addressing issues caused by the prior restriction. Users are encouraged to upgrade to version 2.5.1-3+deb11u2 to ensure their systems are secure.

The second advisory, DLA-4286-1, fixes an uncontrolled recursion vulnerability (CVE-2025-48924) in the libcommons-lang3-java package. This vulnerability could result in a StackOverflowError when processing very long inputs. The recommended update version is 3.11-1+deb11u1. Users are urged to upgrade to mitigate this risk.

In addition, an update for the libcommons-lang-java package has been provided for Debian 9 (Stretch) and 10 (Buster) as part of the Extended LTS (ELTS) support.

For users running Debian 11, it is crucial to stay informed about these updates, as they can significantly impact system stability and security. To apply these updates, users can refer to the Debian LTS wiki for guidance, and for ongoing security status, the security tracker pages for OpenVPN and libcommons-lang3-java provide detailed insights.

Future enhancements could include more robust dependency management and automated alerts for vulnerabilities in packages, improving overall security posture for Debian users. Additionally, integrating real-time monitoring tools could help in quickly identifying and addressing similar vulnerabilities as they arise

OpenVPN and Libcommons-Lang-Java updates for Debian

Two Debian 11 (Bullseye) LTS advisories have been issued to address security vulnerabilities. DLA-4079-2 fixes a regression in openvpn by allowing "\n" and "\r" characters in control channel messages and recommends upgrading to version 2.5.1-3+deb11u2. DLA-4286-1 addresses an uncontrolled recursion vulnerability (CVE-2025-48924) in the libcommons-lang3-java package by updating it to version 3.11-1+deb11u1. This vulnerability could lead to a StackOverflowError on very long inputs, and users are recommended to upgrade their packages. Additionally, an update for libcommons-lang-java has been released for both Debian 9 (Stretch) and 10 (Buster) ELTS.

[DLA 4079-2] openvpn regression update
[DLA 4286-1] libcommons-lang3-java security update
ELA-1510-1 libcommons-lang-java security update

OpenVPN and Libcommons-Lang-Java updates for Debian @ Linux Compatible