openvpn

Edit Package openvpn

NOTE: Automatically created during Factory devel project migration by admin.

Refresh
Refresh
Source Files
Filename Size Changed
client-netconfig.down 0000001043 1.02 KB
client-netconfig.up 0000002188 2.14 KB
openvpn-2.3-plugin-man.dif 0000000787 787 Bytes
openvpn-2.6.7.tar.gz 0001895682 1.81 MB
openvpn-2.6.7.tar.gz.asc 0000000833 833 Bytes
openvpn-tmpfile.conf 0000000032 32 Bytes
openvpn.README.SUSE 0000000821 821 Bytes
openvpn.changes 0000079295 77.4 KB
openvpn.keyring 0000032042 31.3 KB
openvpn.service 0000000484 484 Bytes
openvpn.spec 0000007579 7.4 KB
openvpn.target 0000000097 97 Bytes
rcopenvpn 0000000535 535 Bytes
Revision 197 (latest revision is 209)
Mohd Saquib's avatar Mohd Saquib (msaquib) accepted request 1126537 from Mohd Saquib's avatar Mohd Saquib (msaquib) (revision 197)
- update to 2.6.7:
  * CVE-2023-46850 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly
    use a send buffer after it has been free()d in some circumstances,
    causing some free()d memory to be sent to the peer. All configurations
    using TLS (e.g. not using --secret) are affected by this issue. 
  * CVE-2023-46849 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly
    restore --fragment configuration in some circumstances, leading to a
    division by zero when --fragment is used. On platforms where division
    by zero is fatal, this will cause an OpenVPN crash.
  * DCO: warn if DATA_V1 packets are sent by the other side - this a hard
    incompatibility between a 2.6.x client connecting to a 2.4.0-2.4.4
    server, and the only fix is to use --disable-dco.
  * Remove OpenSSL Engine method for loading a key. This had to be removed
    because the original author did not agree to relicensing the code with
    the new linking exception added. This was a somewhat obsolete feature
    anyway as it only worked with OpenSSL 1.x, which is end-of-support.
  * add warning if p2p NCP client connects to a p2mp server - this is a
    combination that used to work without cipher negotiation (pre 2.6 on
    both ends), but would fail in non-obvious ways with 2.6 to 2.6.
  * add warning to --show-groups that not all supported groups are listed
    (this is due the internal enumeration in OpenSSL being a bit weird,
    omitting X448 and X25519 curves).
  * --dns: remove support for exclude-domains argument (this was a new 2.6
    option, with no backend support implemented yet on any platform, and it
    turns out that no platform supported it at all - so remove option again)
  * warn user if INFO control message too long, do not forward to management
    client (safeguard against protocol-violating server implementations)
  * DCO-WIN: get and log driver version (for easier debugging).
  * print "peer temporary key details" in TLS handshake
  * log OpenSSL errors on failure to set certificate, for example if the
Comments 0
openSUSE Build Service is sponsored by