openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 * Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508) * Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520) * Potential double-free in --x509-alt-username (CVE-2017-7521) * Remote-triggerable memory leaks (CVE-2017-7512) * Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522) * Null-pointer dereference in establish_http_proxy_passthru() * Restrict --x509-alt-username extension types * Fix potential 1-byte overread in TCP option parsing * Fix mbedtls fingerprint calculation * openssl: fix overflow check for long --tls-cipher option * Ensure option array p[] is always NULL-terminated * Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6) Signed-off-by: Magnus Kroken <mkroken@gmail.com>
This commit is contained in:
		 Magnus Kroken
					Magnus Kroken
				
			
				
					committed by
					
						 Jo-Philipp Wich
						Jo-Philipp Wich
					
				
			
			
				
	
			
			
			 Jo-Philipp Wich
						Jo-Philipp Wich
					
				
			
						parent
						
							329f6a96b7
						
					
				
				
					commit
					45f4f6649a
				
			| @@ -1,6 +1,6 @@ | ||||
| --- a/src/openvpn/ssl_mbedtls.c | ||||
| +++ b/src/openvpn/ssl_mbedtls.c | ||||
| @@ -1337,7 +1337,7 @@ const char * | ||||
| @@ -1336,7 +1336,7 @@ const char * | ||||
|  get_ssl_library_version(void) | ||||
|  { | ||||
|      static char mbedtls_version[30]; | ||||
|   | ||||
		Reference in New Issue
	
	Block a user