Skip to content

Commit 57289ae

Browse files
mkrknjow-
authored andcommitted
openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 * Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508) * Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520) * Potential double-free in --x509-alt-username (CVE-2017-7521) * Remote-triggerable memory leaks (CVE-2017-7512) * Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522) * Null-pointer dereference in establish_http_proxy_passthru() * Restrict --x509-alt-username extension types * Fix potential 1-byte overread in TCP option parsing * Fix mbedtls fingerprint calculation * openssl: fix overflow check for long --tls-cipher option * Ensure option array p[] is always NULL-terminated * Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6) Signed-off-by: Magnus Kroken <[email protected]>
1 parent 73e81a8 commit 57289ae

File tree

5 files changed

+14
-13
lines changed

5 files changed

+14
-13
lines changed

package/network/services/openvpn/Makefile

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,15 @@ include $(TOPDIR)/rules.mk
99

1010
PKG_NAME:=openvpn
1111

12-
PKG_VERSION:=2.4.2
12+
PKG_VERSION:=2.4.3
1313
PKG_RELEASE:=1
1414

1515
PKG_SOURCE_URL:=\
1616
https://build.openvpn.net/downloads/releases/ \
17-
https://swupdate.openvpn.net/community/releases/
17+
https://swupdate.openvpn.net/community/releases/ \
18+
http://www.eurephia.net/openvpn/
1819
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.xz
19-
PKG_HASH:=df5c4f384b7df6b08a2f6fa8a84b9fd382baf59c2cef1836f82e2a7f62f1bff9
20+
PKG_HASH:=7aa86167a5b8923e54e8795b814ed77288c793671f59fd830d9ab76d4b480571
2021

2122
PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(BUILD_VARIANT)/$(PKG_NAME)-$(PKG_VERSION)
2223
PKG_MAINTAINER:=Felix Fietkau <[email protected]>

package/network/services/openvpn/patches/001-reproducible-remove_DATE.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
--- a/src/openvpn/options.c
22
+++ b/src/openvpn/options.c
3-
@@ -107,7 +107,6 @@ const char title_string[] =
3+
@@ -106,7 +106,6 @@ const char title_string[] =
44
#ifdef HAVE_AEAD_CIPHER_MODES
55
" [AEAD]"
66
#endif

package/network/services/openvpn/patches/100-mbedtls-disable-runtime-version-check.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
--- a/src/openvpn/ssl_mbedtls.c
22
+++ b/src/openvpn/ssl_mbedtls.c
3-
@@ -1337,7 +1337,7 @@ const char *
3+
@@ -1336,7 +1336,7 @@ const char *
44
get_ssl_library_version(void)
55
{
66
static char mbedtls_version[30];

package/network/services/openvpn/patches/210-build_always_use_internal_lz4.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
--- a/configure.ac
22
+++ b/configure.ac
3-
@@ -1058,37 +1058,14 @@ dnl
3+
@@ -1076,37 +1076,14 @@ dnl
44
AC_ARG_VAR([LZ4_CFLAGS], [C compiler flags for lz4])
55
AC_ARG_VAR([LZ4_LIBS], [linker flags for lz4])
66
if test "$enable_lz4" = "yes" && test "$enable_comp_stub" = "no"; then

package/network/services/openvpn/patches/220-disable_des.patch

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
--- a/src/openvpn/syshead.h
22
+++ b/src/openvpn/syshead.h
3-
@@ -594,11 +594,11 @@ socket_defined(const socket_descriptor_t
3+
@@ -597,11 +597,11 @@ socket_defined(const socket_descriptor_t
44
/*
55
* Should we include NTLM proxy functionality
66
*/
@@ -18,31 +18,31 @@
1818
* Should we include proxy digest auth functionality
1919
--- a/src/openvpn/crypto_mbedtls.c
2020
+++ b/src/openvpn/crypto_mbedtls.c
21-
@@ -320,6 +320,7 @@ int
21+
@@ -319,6 +319,7 @@ int
2222
key_des_num_cblocks(const mbedtls_cipher_info_t *kt)
2323
{
2424
int ret = 0;
2525
+#ifdef MBEDTLS_DES_C
2626
if (kt->type == MBEDTLS_CIPHER_DES_CBC)
2727
{
2828
ret = 1;
29-
@@ -332,6 +333,7 @@ key_des_num_cblocks(const mbedtls_cipher
29+
@@ -331,6 +332,7 @@ key_des_num_cblocks(const mbedtls_cipher
3030
{
3131
ret = 3;
3232
}
3333
+#endif
3434

3535
dmsg(D_CRYPTO_DEBUG, "CRYPTO INFO: n_DES_cblocks=%d", ret);
3636
return ret;
37-
@@ -340,6 +342,7 @@ key_des_num_cblocks(const mbedtls_cipher
37+
@@ -339,6 +341,7 @@ key_des_num_cblocks(const mbedtls_cipher
3838
bool
3939
key_des_check(uint8_t *key, int key_len, int ndc)
4040
{
4141
+#ifdef MBEDTLS_DES_C
4242
int i;
4343
struct buffer b;
4444

45-
@@ -368,11 +371,15 @@ key_des_check(uint8_t *key, int key_len,
45+
@@ -367,11 +370,15 @@ key_des_check(uint8_t *key, int key_len,
4646

4747
err:
4848
return false;
@@ -58,15 +58,15 @@
5858
int i;
5959
struct buffer b;
6060

61-
@@ -387,6 +394,7 @@ key_des_fixup(uint8_t *key, int key_len,
61+
@@ -386,6 +393,7 @@ key_des_fixup(uint8_t *key, int key_len,
6262
}
6363
mbedtls_des_key_set_parity(key);
6464
}
6565
+#endif
6666
}
6767

6868
/*
69-
@@ -698,10 +706,12 @@ cipher_des_encrypt_ecb(const unsigned ch
69+
@@ -710,10 +718,12 @@ cipher_des_encrypt_ecb(const unsigned ch
7070
unsigned char *src,
7171
unsigned char *dst)
7272
{

0 commit comments

Comments
 (0)