Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1463642 (CVE-2017-7508, CVE-2017-7520, CVE-2017-7521, CVE-2017-7522) - CVE-2017-7508 CVE-2017-7520 CVE-2017-7521 CVE-2017-7522 openvpn: Multiple security issues fixed in OpenVPN 2.4.3 and 2.3.17
Summary: CVE-2017-7508 CVE-2017-7520 CVE-2017-7521 CVE-2017-7522 openvpn: Multiple sec...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-7508, CVE-2017-7520, CVE-2017-7521, CVE-2017-7522
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1463643 1463644
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-06-21 12:17 UTC by Adam Mariš
Modified: 2021-02-17 02:00 UTC (History)
6 users (show)

Fixed In Version: openvpn 2.4.3, openvpn 2.3.17
Clone Of:
Environment:
Last Closed: 2017-08-24 09:22:52 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-06-21 12:17:09 UTC
Multiple security issues were fixed in OpenVPN 2.4.3 and 2.3.17, specifically:

CVE-2017-7508: Remotely-triggerable ASSERT() on malformed IPv6 packet

https://github.com/OpenVPN/openvpn/commit/c3f47077a7

CVE-2017-7520: Pre-authentication remote crash/information disclosure for clients

https://github.com/OpenVPN/openvpn/commit/7718c8984f

CVE-2017-7521: Issues in extract_x509_extension() leading to server memory drain/crash/double-free

https://github.com/OpenVPN/openvpn/commit/cb4e35ece4
https://github.com/OpenVPN/openvpn/commit/2d032c7fcd

CVE-2017-7522: Post-authentication remote DoS when using the --x509-track option

https://github.com/OpenVPN/openvpn/commit/426392940c

External References:

https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
https://guidovranken.wordpress.com/2017/06/21/the-openvpn-post-audit-bug-bonanza/

Comment 1 Adam Mariš 2017-06-21 12:17:28 UTC
Acknowledgments:

Name: the OpenVPN project
Upstream: Guido Vranken

Comment 2 Adam Mariš 2017-06-21 12:17:50 UTC
Created openvpn tracking bugs for this issue:

Affects: epel-all [bug 1463644]
Affects: fedora-all [bug 1463643]

Comment 9 Vincent Danen 2017-06-23 17:03:51 UTC
Statement:

This issue does not affect Red Hat Enterprise Linux 5, 6 and 7 as OpenVPN is not included in any of Red Hat's supported products.


Note You need to log in before you can comment on or make changes to this bug.