Summary: | <net-misc/openvpn-2.3.1: ciphertext injection vulnerability in UDP mode (CVE-2013-2061) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | kfm |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | alexander, djc |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 476034 |
Description
kfm
2013-05-06 12:59:49 UTC
I'd be fine with that, but I'll leave it to the security team to decide. Note that we don't support PolarSSL in OpenVPN before 2.3.1. (In reply to comment #0) > > The vulnerability is not considered serious because a definitive attack > vector relies on running OpenVPN with a null cipher. Nevertheless, I would > suggest a stable push for 2.3.1 at the earliest opportunity. Agreed. Arches, please test and mark stable: =net-misc/openvpn-2.3.1 Target KEYWORDS: "alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd ~x86-freebsd ~amd64-linux ~arm-linux ~x86-linux" amd64 stable x86 stable alpha stable arm stable ia64 stable ppc64 stable ppc stable sparc stable Stable for HPPA. s390 stable sh stable GLSA request filed. This issue was resolved and addressed in GLSA 201311-13 at http://security.gentoo.org/glsa/glsa-201311-13.xml by GLSA coordinator Sergey Popov (pinkbyte). CVE-2013-2061 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2061): The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UPD mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher. |