Magnus Kroken
57289ae640
openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details:
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
* Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508)
* Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520)
* Potential double-free in --x509-alt-username (CVE-2017-7521)
* Remote-triggerable memory leaks (CVE-2017-7512)
* Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522)
* Null-pointer dereference in establish_http_proxy_passthru()
* Restrict --x509-alt-username extension types
* Fix potential 1-byte overread in TCP option parsing
* Fix mbedtls fingerprint calculation
* openssl: fix overflow check for long --tls-cipher option
* Ensure option array p[] is always NULL-terminated
* Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6)
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2017-06-26 09:57:11 +02:00
..
2016-12-22 16:42:21 +01:00
2017-06-19 22:07:44 +02:00
2017-06-17 13:50:27 +02:00
2016-10-15 11:36:52 +02:00
2017-05-27 14:24:13 +02:00
2016-12-16 22:39:22 +01:00
2016-12-22 16:42:21 +01:00
2017-01-10 13:02:00 +01:00
2017-05-02 22:08:32 +02:00
2016-12-22 16:42:21 +01:00
2017-06-26 09:57:11 +02:00
2016-12-22 16:42:21 +01:00
2017-03-07 11:27:27 +01:00
2017-02-26 14:38:25 +08:00
2017-05-27 17:40:21 +02:00
2017-02-17 14:43:11 +01:00
2017-06-02 01:29:51 +02:00