diff options
author | Magnus Kroken <mkroken@gmail.com> | 2017-06-22 23:01:01 +0200 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2017-06-26 09:56:07 +0200 |
commit | 45f4f6649a5b0ef8043a59b29052be70a764da6c (patch) | |
tree | 1a7ebf3d0dbd08b8adfcdcdff0547a16f85eca43 /package/network/services/samba36 | |
parent | 329f6a96b70a652beb73686a0ee0d17670d2dc23 (diff) | |
download | upstream-45f4f6649a5b0ef8043a59b29052be70a764da6c.tar.gz upstream-45f4f6649a5b0ef8043a59b29052be70a764da6c.tar.bz2 upstream-45f4f6649a5b0ef8043a59b29052be70a764da6c.zip |
openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details:
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
* Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508)
* Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520)
* Potential double-free in --x509-alt-username (CVE-2017-7521)
* Remote-triggerable memory leaks (CVE-2017-7512)
* Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522)
* Null-pointer dereference in establish_http_proxy_passthru()
* Restrict --x509-alt-username extension types
* Fix potential 1-byte overread in TCP option parsing
* Fix mbedtls fingerprint calculation
* openssl: fix overflow check for long --tls-cipher option
* Ensure option array p[] is always NULL-terminated
* Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6)
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'package/network/services/samba36')
0 files changed, 0 insertions, 0 deletions