diff options
author | Magnus Kroken <mkroken@gmail.com> | 2017-06-22 23:01:01 +0200 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2017-06-26 09:56:07 +0200 |
commit | 45f4f6649a5b0ef8043a59b29052be70a764da6c (patch) | |
tree | 1a7ebf3d0dbd08b8adfcdcdff0547a16f85eca43 /package/network/services/openvpn/patches/220-disable_des.patch | |
parent | 329f6a96b70a652beb73686a0ee0d17670d2dc23 (diff) | |
download | mtk-20170518-45f4f6649a5b0ef8043a59b29052be70a764da6c.zip mtk-20170518-45f4f6649a5b0ef8043a59b29052be70a764da6c.tar.gz mtk-20170518-45f4f6649a5b0ef8043a59b29052be70a764da6c.tar.bz2 |
openvpn: update to 2.4.3
Fixes for security and other issues. See security announcement for more details:
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
* Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508)
* Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520)
* Potential double-free in --x509-alt-username (CVE-2017-7521)
* Remote-triggerable memory leaks (CVE-2017-7512)
* Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522)
* Null-pointer dereference in establish_http_proxy_passthru()
* Restrict --x509-alt-username extension types
* Fix potential 1-byte overread in TCP option parsing
* Fix mbedtls fingerprint calculation
* openssl: fix overflow check for long --tls-cipher option
* Ensure option array p[] is always NULL-terminated
* Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6)
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'package/network/services/openvpn/patches/220-disable_des.patch')
-rw-r--r-- | package/network/services/openvpn/patches/220-disable_des.patch | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/package/network/services/openvpn/patches/220-disable_des.patch b/package/network/services/openvpn/patches/220-disable_des.patch index cd93070..030958d 100644 --- a/package/network/services/openvpn/patches/220-disable_des.patch +++ b/package/network/services/openvpn/patches/220-disable_des.patch @@ -1,6 +1,6 @@ --- a/src/openvpn/syshead.h +++ b/src/openvpn/syshead.h -@@ -594,11 +594,11 @@ socket_defined(const socket_descriptor_t +@@ -597,11 +597,11 @@ socket_defined(const socket_descriptor_t /* * Should we include NTLM proxy functionality */ @@ -18,7 +18,7 @@ * Should we include proxy digest auth functionality --- a/src/openvpn/crypto_mbedtls.c +++ b/src/openvpn/crypto_mbedtls.c -@@ -320,6 +320,7 @@ int +@@ -319,6 +319,7 @@ int key_des_num_cblocks(const mbedtls_cipher_info_t *kt) { int ret = 0; @@ -26,7 +26,7 @@ if (kt->type == MBEDTLS_CIPHER_DES_CBC) { ret = 1; -@@ -332,6 +333,7 @@ key_des_num_cblocks(const mbedtls_cipher +@@ -331,6 +332,7 @@ key_des_num_cblocks(const mbedtls_cipher { ret = 3; } @@ -34,7 +34,7 @@ dmsg(D_CRYPTO_DEBUG, "CRYPTO INFO: n_DES_cblocks=%d", ret); return ret; -@@ -340,6 +342,7 @@ key_des_num_cblocks(const mbedtls_cipher +@@ -339,6 +341,7 @@ key_des_num_cblocks(const mbedtls_cipher bool key_des_check(uint8_t *key, int key_len, int ndc) { @@ -42,7 +42,7 @@ int i; struct buffer b; -@@ -368,11 +371,15 @@ key_des_check(uint8_t *key, int key_len, +@@ -367,11 +370,15 @@ key_des_check(uint8_t *key, int key_len, err: return false; @@ -58,7 +58,7 @@ int i; struct buffer b; -@@ -387,6 +394,7 @@ key_des_fixup(uint8_t *key, int key_len, +@@ -386,6 +393,7 @@ key_des_fixup(uint8_t *key, int key_len, } mbedtls_des_key_set_parity(key); } @@ -66,7 +66,7 @@ } /* -@@ -698,10 +706,12 @@ cipher_des_encrypt_ecb(const unsigned ch +@@ -710,10 +718,12 @@ cipher_des_encrypt_ecb(const unsigned ch unsigned char *src, unsigned char *dst) { |