CVE-2016-6329

Priority
Description
OpenVPN, when using a 64-bit block cipher, makes it easier for remote
attackers to obtain cleartext data via a birthday attack against a
long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN
session using Blowfish in CBC mode, aka a "Sweet32" attack.
Notes
 mdeslaur> openvpn 2.3 and earlier use BF-CBC by default unless the cipher
 mdeslaur> is specified manually. 2.3.12 was modified to display a warning
 mdeslaur> if a 64-bit cipher is selected.
 mdeslaur> Since this is just a warning, downgrading priority to low
 sbeattie> fixed in 2.4.0
Assigned-to
mdeslaur
Package
Upstream:released (2.3.12, 2.4.0)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Trusty/esm:released (2.3.2-7ubuntu3.2)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.3.10-1ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.4.0-4ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (2.4.0-4ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.4.0-4ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (2.4.0-4ubuntu1)
Patches:
Upstream:https://github.com/OpenVPN/openvpn/commit/610fdbbdb0abf65c1e7620143afccd62cd162a8f (warning/2.3)
Upstream:https://github.com/OpenVPN/openvpn/commit/c94b3ff0f5f1dbd4949f18f69ed3611f82a29021 (warning/trunk)
More Information

Updated: 2019-04-26 14:17:39 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)