aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch
diff options
context:
space:
mode:
authorMagnus Kroken <mkroken@gmail.com>2021-04-21 22:10:58 +0200
committerHauke Mehrtens <hauke@hauke-m.de>2021-05-02 14:43:52 +0200
commit7198ae4cf3a796d4b00f5e9c685a538712c4ae99 (patch)
treeab1046c6fbd8c3cdfc4c71fc7d8ff7740fd2ed95 /package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch
parenta8beddcd3462acb62013eccadd4325c84d0114de (diff)
downloadupstream-7198ae4cf3a796d4b00f5e9c685a538712c4ae99.tar.gz
upstream-7198ae4cf3a796d4b00f5e9c685a538712c4ae99.tar.bz2
upstream-7198ae4cf3a796d4b00f5e9c685a538712c4ae99.zip
openvpn: update to 2.4.11
Fixes two related security vulnerabilities (CVE-2020-15078) which under very specific circumstances allow tricking a server using delayed authentication (plugin or management) into returning a PUSH_REPLY before the AUTH_FAILED message, which can possibly be used to gather information about a VPN setup. This release also includes other bug fixes and improvements. Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch')
-rw-r--r--package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch b/package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch
index c7faf7c0c0..a8ad6868c4 100644
--- a/package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch
+++ b/package/network/services/openvpn/patches/110-openssl-dont-use-deprecated-ssleay-symbols.patch
@@ -47,7 +47,7 @@ Signed-off-by: Gert Doering <gert@greenie.muc.de>
#endif
--- a/src/openvpn/ssl_openssl.c
+++ b/src/openvpn/ssl_openssl.c
-@@ -2008,7 +2008,7 @@ get_highest_preference_tls_cipher(char *
+@@ -2018,7 +2018,7 @@ get_highest_preference_tls_cipher(char *
const char *
get_ssl_library_version(void)
{