LWN.net Logo

Mageia alert MGASA-2013-0153 (openvpn)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0153: openvpn-2.2.2-5.3.mga2 (2/core)
Date:  Sat, 25 May 2013 21:43:36 +0200
Message-ID:  <20130525194336.GA29719@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0153 Date: May 25th, 2013 Affected releases: 2 Media: Core Description: Updated openvpn package fixes security vulnerability: OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function. Plaintext recovery may be possible using a padding oracle attack on the CBC mode cipher implementation of the crypto library, optimistically at a rate of about one character per 3 hours. PolarSSL seems vulnerable to such an attack; the vulnerability of OpenSSL has not been verified or tested (CVE-2013-2061). Updated Packages: i586: openvpn-2.2.2-5.3.mga2.i586.rpm openvpn-debug-2.2.2-5.3.mga2.i586.rpm x86_64: openvpn-2.2.2-5.3.mga2.x86_64.rpm openvpn-debug-2.2.2-5.3.mga2.x86_64.rpm SRPMS: openvpn-2.2.2-5.3.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061 https://community.openvpn.net/openvpn/wiki/SecurityAnnoun... http://lists.fedoraproject.org/pipermail/package-announce... https://bugs.mageia.org/show_bug.cgi?id=10125 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds