Описание
Security update for openvpn
This update for openvpn fixes the following security issues:
- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP3-TERADATA
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server for SAP Applications 11 SP4
Ссылки
- Link for SUSE-SU-2017:2838-1
- E-Mail link for SUSE-SU-2017:2838-1
- SUSE Security Ratings
- SUSE Bug 1038709
- SUSE Bug 1038711
- SUSE Bug 1038713
- SUSE Bug 1060877
- SUSE Bug 995374
- SUSE CVE CVE-2016-6329 page
- SUSE CVE CVE-2017-12166 page
- SUSE CVE CVE-2017-7478 page
- SUSE CVE CVE-2017-7479 page
Описание
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Затронутые продукты
Ссылки
- CVE-2016-6329
- SUSE Bug 1026864
- SUSE Bug 995374
Описание
OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
Затронутые продукты
Ссылки
- CVE-2017-12166
- SUSE Bug 1060877
Описание
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
Затронутые продукты
Ссылки
- CVE-2017-7478
- SUSE Bug 1038709
- SUSE Bug 1038713
Описание
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
Затронутые продукты
Ссылки
- CVE-2017-7479
- SUSE Bug 1038711
- SUSE Bug 1038713