diff options
author | Magnus Kroken <mkroken@gmail.com> | 2017-06-22 23:01:01 +0200 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2017-06-26 09:57:11 +0200 |
commit | 57289ae6403d9d03a419337f266194d3ae6909d0 (patch) | |
tree | 3272b71bc5630b32fd75da29ebfdc5beca810fc0 /target/linux/octeon | |
parent | 73e81a8318d1038cbcb2ad788bf8d956f338f587 (diff) | |
download | upstream-57289ae6403d9d03a419337f266194d3ae6909d0.tar.gz upstream-57289ae6403d9d03a419337f266194d3ae6909d0.tar.bz2 upstream-57289ae6403d9d03a419337f266194d3ae6909d0.zip |
openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details:
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
* Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508)
* Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520)
* Potential double-free in --x509-alt-username (CVE-2017-7521)
* Remote-triggerable memory leaks (CVE-2017-7512)
* Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522)
* Null-pointer dereference in establish_http_proxy_passthru()
* Restrict --x509-alt-username extension types
* Fix potential 1-byte overread in TCP option parsing
* Fix mbedtls fingerprint calculation
* openssl: fix overflow check for long --tls-cipher option
* Ensure option array p[] is always NULL-terminated
* Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6)
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'target/linux/octeon')
0 files changed, 0 insertions, 0 deletions