CVE-2016-6329

Priority
Description
OpenVPN, when using a 64-bit block cipher, makes it easier for remote
attackers to obtain cleartext data via a birthday attack against a
long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN
session using Blowfish in CBC mode, aka a "Sweet32" attack.
Assigned-to
mdeslaur
Notes
mdeslauropenvpn 2.3 and earlier use BF-CBC by default unless the cipher
is specified manually. 2.3.12 was modified to display a warning
if a 64-bit cipher is selected.
Since this is just a warning, downgrading priority to low
sbeattiefixed in 2.4.0
Package
Upstream:released (2.3.12, 2.4.0)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (2.3.2-7ubuntu3.2)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.3.10-1ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.4.0-4ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.4.0-4ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (2.4.0-4ubuntu1)
Patches:
Upstream:https://github.com/OpenVPN/openvpn/commit/610fdbbdb0abf65c1e7620143afccd62cd162a8f (warning/2.3)
Upstream:https://github.com/OpenVPN/openvpn/commit/c94b3ff0f5f1dbd4949f18f69ed3611f82a29021 (warning/trunk)
More Information

Updated: 2019-10-09 06:24:16 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)