SUSE Security Update: Security update for openvpn
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1622-1
Rating:             important
References:         #1038709 #1038711 #1038713 #995374 
Cross-References:   CVE-2016-6329 CVE-2017-7478 CVE-2017-7479
                   
Affected Products:
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for openvpn fixes the following issues:

   - CVE-2016-6329: Show which ciphers should no longer be used in openvpn
     --show-ciphers (bsc#995374)
   - CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big
     payload in P_CONTROL (bsc#1038709)
   - CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID
     counter (bsc#1038711)
   - Hardening measures found by internal audit (bsc#1038713)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-998=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-998=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-998=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      openvpn-2.3.8-16.14.1
      openvpn-auth-pam-plugin-2.3.8-16.14.1
      openvpn-auth-pam-plugin-debuginfo-2.3.8-16.14.1
      openvpn-debuginfo-2.3.8-16.14.1
      openvpn-debugsource-2.3.8-16.14.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      openvpn-2.3.8-16.14.1
      openvpn-auth-pam-plugin-2.3.8-16.14.1
      openvpn-auth-pam-plugin-debuginfo-2.3.8-16.14.1
      openvpn-debuginfo-2.3.8-16.14.1
      openvpn-debugsource-2.3.8-16.14.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      openvpn-2.3.8-16.14.1
      openvpn-debuginfo-2.3.8-16.14.1
      openvpn-debugsource-2.3.8-16.14.1


References:

   https://www.suse.com/security/cve/CVE-2016-6329.html
   https://www.suse.com/security/cve/CVE-2017-7478.html
   https://www.suse.com/security/cve/CVE-2017-7479.html
   https://bugzilla.suse.com/1038709
   https://bugzilla.suse.com/1038711
   https://bugzilla.suse.com/1038713
   https://bugzilla.suse.com/995374

SuSE: 2017:1622-1: important: openvpn

June 20, 2017
An update that solves three vulnerabilities and has one An update that solves three vulnerabilities and has one An update that solves three vulnerabilities and has one errata is no...

Summary

This update for openvpn fixes the following issues: - CVE-2016-6329: Show which ciphers should no longer be used in openvpn --show-ciphers (bsc#995374) - CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big payload in P_CONTROL (bsc#1038709) - CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID counter (bsc#1038711) - Hardening measures found by internal audit (bsc#1038713) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-998=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-998=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-998=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): openvpn-2.3.8-16.14.1 openvpn-auth-pam-plugin-2.3.8-16.14.1 openvpn-auth-pam-plugin-debuginfo-2.3.8-16.14.1 openvpn-debuginfo-2.3.8-16.14.1 openvpn-debugsource-2.3.8-16.14.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): openvpn-2.3.8-16.14.1 openvpn-auth-pam-plugin-2.3.8-16.14.1 openvpn-auth-pam-plugin-debuginfo-2.3.8-16.14.1 openvpn-debuginfo-2.3.8-16.14.1 openvpn-debugsource-2.3.8-16.14.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): openvpn-2.3.8-16.14.1 openvpn-debuginfo-2.3.8-16.14.1 openvpn-debugsource-2.3.8-16.14.1

References

#1038709 #1038711 #1038713 #995374

Cross- CVE-2016-6329 CVE-2017-7478 CVE-2017-7479

Affected Products:

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2

SUSE Linux Enterprise Server 12-SP2

SUSE Linux Enterprise Desktop 12-SP2

https://www.suse.com/security/cve/CVE-2016-6329.html

https://www.suse.com/security/cve/CVE-2017-7478.html

https://www.suse.com/security/cve/CVE-2017-7479.html

https://bugzilla.suse.com/1038709

https://bugzilla.suse.com/1038711

https://bugzilla.suse.com/1038713

https://bugzilla.suse.com/995374

Severity
Announcement ID: SUSE-SU-2017:1622-1
Rating: important

Related News