logo
DATABASE RESOURCES PRICING ABOUT US

Updated openvpn packages fix security vulnerability

Description

The bounds check in read_key() was performed after using the value, instead of before. If 'key-method 1' is used, this allowed an attacker to send a malformed packet to trigger a stack buffer overflow. Note that 'key-method 1' has been replaced by 'key method 2' as the default in OpenVPN 2.0 (CVE-2017-12166).


Affected Package


OS OS Version Package Name Package Version
Mageia 5 openvpn 2.3.18-1
Mageia 6 openvpn 2.4.4-1

Related