openvpn: security bump to version 2.4.3
authorBaruch Siach <baruch@tkos.co.il>
Thu, 22 Jun 2017 17:54:57 +0000 (20:54 +0300)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 22 Jun 2017 21:26:57 +0000 (23:26 +0200)
Fixes:

CVE-2017-7508 - Remotely-triggerable ASSERT() on malformed IPv6 packet

CVE-2017-7520 - Pre-authentication remote crash/information disclosure for
clients

CVE-2017-7521 - Potential double-free in --x509-alt-username

CVE-2017-7521 - Remote-triggerable memory leaks

CVE-2017-7522 - Post-authentication remote DoS when using the --x509-track
option

Details at

  https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243

Cc: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/openvpn/openvpn.hash
package/openvpn/openvpn.mk

index fe054e96180f7ce00fe260620326c2dfcb574381..1db3a31e1dfae98a007f8d645c3d57bf2fb1b42e 100644 (file)
@@ -1,2 +1,2 @@
-# Locally calculated
-sha256 df5c4f384b7df6b08a2f6fa8a84b9fd382baf59c2cef1836f82e2a7f62f1bff9  openvpn-2.4.2.tar.xz
+# Locally calculated after checking signature
+sha256 15e15fc97f189b52aee7c90ec8355aa77469c773125110b4c2f089abecde36fb  openvpn-2.4.3.tar.xz
index ff6bcdcee6245fee94951019ba7b67167d6401b9..7cc572e4e7716b91e131e8f37491884bd8ffe13c 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-OPENVPN_VERSION = 2.4.2
+OPENVPN_VERSION = 2.4.3
 OPENVPN_SOURCE = openvpn-$(OPENVPN_VERSION).tar.xz
 OPENVPN_SITE = http://swupdate.openvpn.net/community/releases
 OPENVPN_DEPENDENCIES = host-pkgconf openssl