A recent *"Lab Mouse Security research blog" entry*
<http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html>
claimed
that a bug exists in several implementations of the LZO algorithm commonly
used by OpenVPN and that the bug causes a security vulnerability.

A rebuttal on the "RealTime Data Compression" blog
<http://fastcompression.blogspot.co.uk/2014/06/lets-move-on.html> points
out that the circumstances required to exploit the vulnerability make
exploitation unlikely. Among other requirements, the rebuttal says that a
problem only happens with block sizes larger than 8MB.

Am I correct to assume that OpenVPN's use of LZO is restricted to much
smaller block sizes? I assume the block sizes that OpenVPN uses LZO for are
limited to the maximum packet size, which would be on the order of 1500
bytes or so (because of MTU size limits).

Or does OpenVPN ever use LZO on larger amounts of data? Is there any
possibility of OpenVPN using LZO on 8MB?

* Also see the discussion on the LZ4 discussion board
<https://code.google.com/p/lz4/issues/detail?id=52>; the vulnerability was
actually discovered by Ludvig Strigeus
<https://en.wikipedia.org/wiki/Ludvig_Strigeus> eighteen months ago.

Reply via email to