Date: Thu, 16 Apr 2020 09:32:25 +0000 (UTC) From: Matthias Andree <mandree@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r531833 - head/security/vuxml Message-ID: <202004160932.03G9WPeT092632@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mandree Date: Thu Apr 16 09:32:25 2020 New Revision: 531833 URL: https://svnweb.freebsd.org/changeset/ports/531833 Log: document security/openvpn{,-mbedtls,-devel} illegal client float DoS URL: https://community.openvpn.net/openvpn/ticket/1272 Reported by: Lev Stipakov Security: CVE-2020-11810 Security: 8604121c-7fc2-11ea-bcac-7781e90b0c8f Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Apr 16 09:16:53 2020 (r531832) +++ head/security/vuxml/vuln.xml Thu Apr 16 09:32:25 2020 (r531833) @@ -58,6 +58,55 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8604121c-7fc2-11ea-bcac-7781e90b0c8f"> + <topic>openvpn -- illegal client float can break VPN session for other users</topic> + <affects> + <package> + <name>openvpn</name> + <range><lt>2.4.8_3</lt></range> + </package> + <package> + <name>openvpn-mbedtls</name> + <range><lt>2.4.8_3</lt></range> + </package> + <package> + <name>openvpn-devel</name> + <range><lt>202016</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Lev Stipakov and Gert Doering report:</p> + <blockquote cite="https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881"> + <p>There is a time frame between allocating peer-id and initializing data + channel key (which is performed on receiving push request or on async + push-reply) in which the existing peer-id float checks do not work right.</p> + <p>If a "rogue" data channel packet arrives during that time frame from + another address and with same peer-id, this would cause client to float + to that new address.</p> + <p>The net effect of this behaviour is that the VPN session for the + "victim client" is broken. Since the "attacker client" does not have + suitable keys, it can not inject or steal VPN traffic from the other + session. The time window is small and it can not be used to attack + a specific client's session, unless some other way is found to make it + disconnect and reconnect first.</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881</url> + <url>https://sourceforge.net/p/openvpn/openvpn/ci/f7b318f811bb43c0d3aa7f337ec6242ed2c33881/</url> + <url>https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg19720.html</url> + <url>https://community.openvpn.net/openvpn/ticket/1272</url> + <url>https://patchwork.openvpn.net/patch/1077/</url> + <cvename>CVE-2020-11810</cvename> + </references> + <dates> + <discovery>2020-04-13</discovery> + <entry>2020-04-16</entry> + </dates> + </vuln> + <vuln vid="bf1f47c4-7f1b-11ea-bf94-001cc0382b2f"> <topic>Mbed TLS -- Side channel attack on ECDSA</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202004160932.03G9WPeT092632>