Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 1 Jun 2013 16:47:41 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r319579 - in head/security: openvpn20 openvpn20/files openvpn22 openvpn22/files vuxml
Message-ID:  <201306011647.r51GlfnG028889@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Sat Jun  1 16:47:41 2013
New Revision: 319579
URL: http://svnweb.freebsd.org/changeset/ports/319579

Log:
  - Backport fix for CVE-2013-2061 to openvpn22 and openvpn20;
    while it is unclear whether it affects OpenSSL-builds at all.
    Let's play it safe.
  - Reference CVE-2013-2061 name in OpenVPN's VuXML entry
  - Mark 2.0.9_4 <= openvpn < 2.1.0 and 2.2.2_2 < openvpn < 2.3.0 not vulnerable
  - Mark openvpn22 deprecated and to expire 2013-09-01.
    (openvpn20 is already marked to expire 2013-07-11.)
  
  Security:	CVE-2013-2061
  Security:	92f30415-9935-11e2-ad4c-080027ef73ec

Added:
  head/security/openvpn20/files/patch-CVE-2013-2061   (contents, props changed)
  head/security/openvpn22/files/patch-CVE-2013-2061   (contents, props changed)
Modified:
  head/security/openvpn20/Makefile
  head/security/openvpn22/Makefile
  head/security/vuxml/vuln.xml

Modified: head/security/openvpn20/Makefile
==============================================================================
--- head/security/openvpn20/Makefile	Sat Jun  1 16:35:57 2013	(r319578)
+++ head/security/openvpn20/Makefile	Sat Jun  1 16:47:41 2013	(r319579)
@@ -3,7 +3,7 @@
 
 PORTNAME=	openvpn
 PORTVERSION=	2.0.9
-PORTREVISION=	3
+PORTREVISION=	4
 CATEGORIES=	security net
 # MASTER_SITES points to hosts in distinct data centers,
 # so just one MASTER_SITES entry should be OK.

Added: head/security/openvpn20/files/patch-CVE-2013-2061
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvpn20/files/patch-CVE-2013-2061	Sat Jun  1 16:47:41 2013	(r319579)
@@ -0,0 +1,74 @@
+commit 11d21349a4e7e38a025849479b36ace7c2eec2ee
+Author: Steffan Karger <steffan.karger@fox-it.com>
+Date:   Tue Mar 19 13:01:50 2013 +0100
+
+    Use constant time memcmp when comparing HMACs in openvpn_decrypt.
+    
+    Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
+    Acked-by: Gert Doering <gert@greenie.muc.de>
+    Signed-off-by: Gert Doering <gert@greenie.muc.de>
+
+diff --git a/src/openvpn/buffer.h b/src/openvpn/buffer.h
+index 7cae733..93efb09 100644
+--- ./buffer.h~
++++ ./buffer.h
+@@ -668,6 +668,10 @@ buf_read_u32 (struct buffer *buf, bool *good)
+     }
+ }
+ 
++/**
++ * Compare src buffer contents with match.
++ * *NOT* constant time. Do not use when comparing HMACs.
++ */
+ static inline bool
+ buf_string_match (const struct buffer *src, const void *match, int size)
+ {
+@@ -676,6 +680,10 @@ buf_string_match (const struct buffer *src, const void *match, int size)
+   return memcmp (BPTR (src), match, size) == 0;
+ }
+ 
++/**
++ * Compare first size bytes of src buffer contents with match.
++ * *NOT* constant time. Do not use when comparing HMACs.
++ */
+ static inline bool
+ buf_string_match_head (const struct buffer *src, const void *match, int size)
+ {
+diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c
+index 405c0aa..d9adf5b 100644
+--- ./crypto.c~
++++ ./crypto.c
+@@ -65,6 +65,24 @@
+ #define CRYPT_ERROR(format) \
+   do { msg (D_CRYPT_ERRORS, "%s: " format, error_prefix); goto error_exit; } while (false)
+ 
++/**
++ * As memcmp(), but constant-time.
++ * Returns 0 when data is equal, non-zero otherwise.
++ */
++static int
++memcmp_constant_time (const void *a, const void *b, size_t size) {
++  const uint8_t * a1 = a;
++  const uint8_t * b1 = b;
++  int ret = 0;
++  size_t i;
++
++  for (i = 0; i < size; i++) {
++      ret |= *a1++ ^ *b1++;
++  }
++
++  return ret;
++}
++
+ void
+ openvpn_encrypt (struct buffer *buf, struct buffer work,
+ 		 const struct crypto_options *opt,
+@@ -244,7 +262,7 @@ openvpn_decrypt (struct buffer *buf, struct buffer work,
+ 	  hmac_ctx_final (ctx->hmac, local_hmac);
+ 
+ 	  /* Compare locally computed HMAC with packet HMAC */
+-	  if (memcmp (local_hmac, BPTR (buf), hmac_len))
++	  if (memcmp_constant_time (local_hmac, BPTR (buf), hmac_len))
+ 	    CRYPT_ERROR ("packet HMAC authentication failed");
+ 
+ 	  ASSERT (buf_advance (buf, hmac_len));

Modified: head/security/openvpn22/Makefile
==============================================================================
--- head/security/openvpn22/Makefile	Sat Jun  1 16:35:57 2013	(r319578)
+++ head/security/openvpn22/Makefile	Sat Jun  1 16:47:41 2013	(r319579)
@@ -3,7 +3,7 @@
 
 PORTNAME=	openvpn
 DISTVERSION=	2.2.2
-PORTREVISION=	1
+PORTREVISION=	2
 CATEGORIES=	security net
 # MASTER_SITES points to hosts in distinct data centers,
 # so just one MASTER_SITES entry should be OK.
@@ -18,6 +18,9 @@ LICENSE=	GPLv2
 LATEST_LINK=	openvpn22
 CONFLICTS_INSTALL=	openvpn-devel-[0-9]* openvpn-2.[!2]* openvpn-beta-[0-9]*
 
+DEPRECATED=		Please migrate to a newer OpenVPN version
+EXPIRATION_DATE=	2013-09-01
+
 GNU_CONFIGURE=	yes
 USE_OPENSSL=	yes
 USE_XZ=		yes

Added: head/security/openvpn22/files/patch-CVE-2013-2061
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvpn22/files/patch-CVE-2013-2061	Sat Jun  1 16:47:41 2013	(r319579)
@@ -0,0 +1,74 @@
+commit 11d21349a4e7e38a025849479b36ace7c2eec2ee
+Author: Steffan Karger <steffan.karger@fox-it.com>
+Date:   Tue Mar 19 13:01:50 2013 +0100
+
+    Use constant time memcmp when comparing HMACs in openvpn_decrypt.
+    
+    Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
+    Acked-by: Gert Doering <gert@greenie.muc.de>
+    Signed-off-by: Gert Doering <gert@greenie.muc.de>
+
+diff --git a/src/openvpn/buffer.h b/src/openvpn/buffer.h
+index 7cae733..93efb09 100644
+--- ./buffer.h~
++++ ./buffer.h
+@@ -668,6 +668,10 @@ buf_read_u32 (struct buffer *buf, bool *good)
+     }
+ }
+ 
++/**
++ * Compare src buffer contents with match.
++ * *NOT* constant time. Do not use when comparing HMACs.
++ */
+ static inline bool
+ buf_string_match (const struct buffer *src, const void *match, int size)
+ {
+@@ -676,6 +680,10 @@ buf_string_match (const struct buffer *src, const void *match, int size)
+   return memcmp (BPTR (src), match, size) == 0;
+ }
+ 
++/**
++ * Compare first size bytes of src buffer contents with match.
++ * *NOT* constant time. Do not use when comparing HMACs.
++ */
+ static inline bool
+ buf_string_match_head (const struct buffer *src, const void *match, int size)
+ {
+diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c
+index 405c0aa..d9adf5b 100644
+--- ./crypto.c~
++++ ./crypto.c
+@@ -65,6 +65,24 @@
+ #define CRYPT_ERROR(format) \
+   do { msg (D_CRYPT_ERRORS, "%s: " format, error_prefix); goto error_exit; } while (false)
+ 
++/**
++ * As memcmp(), but constant-time.
++ * Returns 0 when data is equal, non-zero otherwise.
++ */
++static int
++memcmp_constant_time (const void *a, const void *b, size_t size) {
++  const uint8_t * a1 = a;
++  const uint8_t * b1 = b;
++  int ret = 0;
++  size_t i;
++
++  for (i = 0; i < size; i++) {
++      ret |= *a1++ ^ *b1++;
++  }
++
++  return ret;
++}
++
+ void
+ openvpn_encrypt (struct buffer *buf, struct buffer work,
+ 		 const struct crypto_options *opt,
+@@ -244,7 +262,7 @@ openvpn_decrypt (struct buffer *buf, struct buffer work,
+ 	  hmac_ctx_final (ctx->hmac, local_hmac);
+ 
+ 	  /* Compare locally computed HMAC with packet HMAC */
+-	  if (memcmp (local_hmac, BPTR (buf), hmac_len))
++	  if (memcmp_constant_time (local_hmac, BPTR (buf), hmac_len))
+ 	    CRYPT_ERROR ("packet HMAC authentication failed");
+ 
+ 	  ASSERT (buf_advance (buf, hmac_len));

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Jun  1 16:35:57 2013	(r319578)
+++ head/security/vuxml/vuln.xml	Sat Jun  1 16:47:41 2013	(r319579)
@@ -1662,7 +1662,9 @@ Note:  Please add new entries to the beg
     <affects>
       <package>
 	<name>openvpn</name>
-	<range><lt>2.3.1</lt></range>
+	<range><lt>2.0.9_4</lt></range>
+	<range><ge>2.1.0</ge><lt>2.2.2_2</lt></range>
+	<range><ge>2.3.0</ge><lt>2.3.1</lt></range>
       </package>
     </affects>
     <description>
@@ -1677,10 +1679,12 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <url>https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc</url>;
+      <cvename>CVE-2013-2061</cvename>
     </references>
     <dates>
       <discovery>2013-03-19</discovery>
       <entry>2013-03-31</entry>
+      <modified>2013-06-01</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201306011647.r51GlfnG028889>