openvpn: update to 2.6.8
This is a bugfix release containing security fixes. Security Fixes (included in 2.6.7): CVE-2023-46850 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly use a send buffer after it has been free()d in some circumstances, causing some free()d memory to be sent to the peer. All configurations using TLS (e.g. not using --secret) are affected by this issue. CVE-2023-46849 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly restore --fragment configuration in some circumstances, leading to a division by zero when --fragment is used. On platforms where division by zero is fatal, this will cause an OpenVPN crash. For details refer to https://github.com/OpenVPN/openvpn/blob/v2.6.8/Changes.rst Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
This commit is contained in:
parent
5ffdf3392f
commit
f52f437070
5 changed files with 9 additions and 9 deletions
|
@ -9,14 +9,14 @@ include $(TOPDIR)/rules.mk
|
||||||
|
|
||||||
PKG_NAME:=openvpn
|
PKG_NAME:=openvpn
|
||||||
|
|
||||||
PKG_VERSION:=2.6.6
|
PKG_VERSION:=2.6.8
|
||||||
PKG_RELEASE:=1
|
PKG_RELEASE:=1
|
||||||
|
|
||||||
PKG_SOURCE_URL:=\
|
PKG_SOURCE_URL:=\
|
||||||
https://build.openvpn.net/downloads/releases/ \
|
https://build.openvpn.net/downloads/releases/ \
|
||||||
https://swupdate.openvpn.net/community/releases/
|
https://swupdate.openvpn.net/community/releases/
|
||||||
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
|
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
|
||||||
PKG_HASH:=3b074f392818b31aa529b84f76e8b5e4ad03fca764924f46d906bceaaf421034
|
PKG_HASH:=5ede1565c8a6d880100f7f235317a7ee9eea83d5052db5547f13a9e76af7805d
|
||||||
|
|
||||||
PKG_MAINTAINER:=Magnus Kroken <mkroken@gmail.com>
|
PKG_MAINTAINER:=Magnus Kroken <mkroken@gmail.com>
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
--- a/src/openvpn/ssl_mbedtls.c
|
--- a/src/openvpn/ssl_mbedtls.c
|
||||||
+++ b/src/openvpn/ssl_mbedtls.c
|
+++ b/src/openvpn/ssl_mbedtls.c
|
||||||
@@ -1535,7 +1535,7 @@ const char *
|
@@ -1533,7 +1533,7 @@ const char *
|
||||||
get_ssl_library_version(void)
|
get_ssl_library_version(void)
|
||||||
{
|
{
|
||||||
static char mbedtls_version[30];
|
static char mbedtls_version[30];
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
--- a/src/openvpn/crypto_openssl.c
|
--- a/src/openvpn/crypto_openssl.c
|
||||||
+++ b/src/openvpn/crypto_openssl.c
|
+++ b/src/openvpn/crypto_openssl.c
|
||||||
@@ -51,7 +51,7 @@
|
@@ -49,7 +49,7 @@
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
|
@ -9,8 +9,8 @@
|
||||||
#include <openssl/kdf.h>
|
#include <openssl/kdf.h>
|
||||||
#endif
|
#endif
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||||
@@ -1436,7 +1436,7 @@ engine_load_key(const char *file, SSL_CT
|
@@ -1374,7 +1374,7 @@ memcmp_constant_time(const void *a, cons
|
||||||
#endif /* if HAVE_OPENSSL_ENGINE */
|
return CRYPTO_memcmp(a, b, size);
|
||||||
}
|
}
|
||||||
|
|
||||||
-#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
-#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
--- a/src/openvpn/ssl_openssl.c
|
--- a/src/openvpn/ssl_openssl.c
|
||||||
+++ b/src/openvpn/ssl_openssl.c
|
+++ b/src/openvpn/ssl_openssl.c
|
||||||
@@ -1351,7 +1351,7 @@ err:
|
@@ -1347,7 +1347,7 @@ err:
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@
|
||||||
|
|
||||||
/* called when EC_KEY is destroyed */
|
/* called when EC_KEY is destroyed */
|
||||||
static void
|
static void
|
||||||
@@ -1512,7 +1512,7 @@ tls_ctx_use_management_external_key(stru
|
@@ -1508,7 +1508,7 @@ tls_ctx_use_management_external_key(stru
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
--- a/src/openvpn/ssl_verify_openssl.c
|
--- a/src/openvpn/ssl_verify_openssl.c
|
||||||
+++ b/src/openvpn/ssl_verify_openssl.c
|
+++ b/src/openvpn/ssl_verify_openssl.c
|
||||||
@@ -269,6 +269,9 @@ backend_x509_get_username(char *common_n
|
@@ -267,6 +267,9 @@ backend_x509_get_username(char *common_n
|
||||||
return FAILURE;
|
return FAILURE;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue