Page MenuHomeSolus

Update openvpn to 2.4.3 (to fix multiple CVE's)
ClosedPublic

Authored by kyrios123 on Jun 21 2017, 1:53 PM.
Tags
Referenced Files
F10985804: D452.diff
Sun, Jul 23, 10:56 PM
F10834173: D452.id.diff
Jun 7 2023, 7:31 AM
F10814720: D452.id977.diff
May 31 2023, 5:11 PM
F10791150: D452.id977.diff
May 27 2023, 1:49 AM
F10756851: D452.diff
May 17 2023, 5:12 AM
F10751726: D452.id977.diff
May 16 2023, 12:54 PM
F10722347: D452.diff
May 6 2023, 7:29 PM

Details

Summary

Security

  • CVE-2017-7522: Fix --x509-track post-authentication remote DoS A client could crash a 2.4+ mbedtls server, if that server uses the --x509-track option and the client has a correct, signed and unrevoked certificate that contains an embedded NUL in the certificate subject.
  • CVE-2017-7521: Fix post-authentication remote-triggerable memory leaks A client could cause a server to leak a few bytes each time it connects to the server. That can eventuall cause the server to run out of memory, and thereby causing the server process to terminate.
  • CVE-2017-7521: Fix a potential post-authentication remote code execution attack on servers that use the --x509-username-field option with an X.509 extension field (option argument prefixed with ext:). A client that can cause a server to run out-of-memory (see above) might be able to cause the server to double free, which in turn might lead to remote code execution.
  • CVE-2017-7520: Pre-authentication remote crash/information disclosure for clients. If clients use a HTTP proxy with NTLM authentication (i.e. --http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2), a man-in-the-middle attacker between the client and the proxy can cause the client to crash or disclose at most 96 bytes of stack memory. The disclosed stack memory is likely to contain the proxy password. If the proxy password is not reused, this is unlikely to compromise the security of the OpenVPN tunnel itself. Clients who do not use the --http-proxy option with ntlm2 authentication are not affected.
  • CVE-2017-7508: Fix remotely-triggerable ASSERT() on malformed IPv6 packet. This can be used to remotely shutdown an openvpn server or client, if IPv6 and --mssfix are enabled and the IPv6 networks used inside the VPN are known.
  • Fix null-pointer dereference when talking to a malicious http proxy that returns a malformed Proxy-Authenticate: headers for digest auth.
  • Fix overflow check for long --tls-cipher option

For new features, changes and bugfixes, please read the [full changelog)(https://github.com/OpenVPN/openvpn/blob/master/Changes.rst#version-243)

Signed-off-by: Pierre-Yves <pyu@riseup.net>

Test Plan
  • Test Crypto:
    • sudo openvpn --genkey --secret key
    • sudo openvpn --test-crypto --secret key
  • Test SSL/TLS negotiations:
    • sudo openvpn --config sample/sample-config-files/loopback-client (in terminal #1)
    • sudo openvpn --config sample/sample-config-files/loopback-server (simultaneously in terminal #2)

Diff Detail

Repository
R2261 openvpn
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

kyrios123 retitled this revision from Update openvpn to 2.4.3 to Update openvpn to 2.4.3 (to fix multiple CVE's).Jun 21 2017, 1:54 PM
This revision is now accepted and ready to land.Jun 22 2017, 7:39 AM
This revision was automatically updated to reflect the committed changes.