Package name
Advisory ID
Affected versions
MES5 i586 , MBS1 x86_64 , MES5 x86_64

Problem description

Updated openvpn package fixes security vulnerability:

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen
ciphertext injection due to a non-constant-time HMAC comparison
function. Plaintext recovery may be possible using a padding oracle
attack on the CBC mode cipher implementation of the crypto library,
optimistically at a rate of about one character per 3 hours. PolarSSL
seems vulnerable to such an attack; the vulnerability of OpenSSL has
not been verified or tested (CVE-2013-2061).

Updated packages

MES5 i586

 c3f9d0b84493a7df95b526bf27684644  mes5/i586/openvpn-2.1-0.rc10.2.4mdvmes5.2.i586.rpm 
 c1808613e341bb1ebcabcebb2ad5fd47  mes5/SRPMS/openvpn-2.1-0.rc10.2.4mdvmes5.2.src.rpm

MBS1 x86_64

 9644de77991bb55ddff9801c7cb8f5a8  mbs1/x86_64/openvpn-2.2.2-6.1.mbs1.x86_64.rpm 
 b4b073c276bd20929db3bcb2b6e80621  mbs1/SRPMS/openvpn-2.2.2-6.1.mbs1.src.rpm

MES5 x86_64

 ff387b293bcba6c126b14431d1bcb7ab  mes5/x86_64/openvpn-2.1-0.rc10.2.4mdvmes5.2.x86_64.rpm 
 c1808613e341bb1ebcabcebb2ad5fd47  mes5/SRPMS/openvpn-2.1-0.rc10.2.4mdvmes5.2.src.rpm