Описание
Security update for openvpn
This update for openvpn fixes the following issues:
- It was possible to trigger an assertion by sending a malformed IPv6 packet. That issue could have been abused to remotely shutdown an openvpn server or client, if IPv6 and --mssfix were enabled and if the IPv6 networks used inside the VPN were known. [bsc#1044947, CVE-2017-7508]
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
openvpn-2.0.9-143.46.1
openvpn-auth-pam-plugin-2.0.9-143.46.1
SUSE Linux Enterprise Server 11 SP3-LTSS
openvpn-2.0.9-143.46.1
openvpn-auth-pam-plugin-2.0.9-143.46.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
openvpn-2.0.9-143.46.1
openvpn-auth-pam-plugin-2.0.9-143.46.1
SUSE Linux Enterprise Server 11 SP4
openvpn-2.0.9-143.46.1
openvpn-auth-pam-plugin-2.0.9-143.46.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
openvpn-2.0.9-143.46.1
openvpn-auth-pam-plugin-2.0.9-143.46.1
Ссылки
- Link for SUSE-SU-2017:1642-1
- E-Mail link for SUSE-SU-2017:1642-1
- SUSE Security Ratings
- SUSE Bug 1044947
- SUSE CVE CVE-2017-7508 page
Описание
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-2.0.9-143.46.1
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-auth-pam-plugin-2.0.9-143.46.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-2.0.9-143.46.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-auth-pam-plugin-2.0.9-143.46.1
Ссылки
- CVE-2017-7508
- SUSE Bug 1044947