Home > Security > Advisories

Advisories

Mandriva Advisories

Package name openvpn
Date April 10th, 2006
Advisory ID MDKSA-2006:069
Affected versions MNF2.0, 2006.0
Synopsis Updated openvpn packages fix vulnerability

Problem Description

A vulnerability in OpenVPN 2.0 through 2.0.5 allows a malicious server
to execute arbitrary code on the client by using setenv with the
LD_PRELOAD environment variable.

Updated packages have been patched to correct this issue by removing
setenv support.

Updated Packages

Multi Network Firewall 2.0

 04b0406ea806da8e1f941910b0f19659  mnf/2.0/RPMS/openvpn-2.0.1-0.3.M20mdk.i586.rpm
 825a02efe56ddc34fcdc49784c50b1e1  mnf/2.0/SRPMS/openvpn-2.0.1-0.3.M20mdk.src.rpm

Mandriva Linux 2006

 699824d9aa9e42bf579165599268efbb  2006.0/RPMS/openvpn-2.0.1-2.2.20060mdk.i586.rpm
 38bb27a8f28546fe9cdf06213a172868  2006.0/SRPMS/openvpn-2.0.1-2.2.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 4e8a99c3997f8ecd7e41aee1594a02dc  x86_64/2006.0/RPMS/openvpn-2.0.1-2.2.20060mdk.x86_64.rpm
 38bb27a8f28546fe9cdf06213a172868  x86_64/2006.0/SRPMS/openvpn-2.0.1-2.2.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1629

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.