diff options
author | Alberto Gonzalez Iniesta <agi@inittab.org> | 2017-06-22 17:25:13 +0200 |
---|---|---|
committer | Bernhard Schmidt <berni@debian.org> | 2017-06-29 22:05:44 +0200 |
commit | 3e3e9b32519a38f9316986b877163d37557b4f70 (patch) | |
tree | 9ee9a4a6f2813fe4ce4623bab80d6a6c30660854 /debian/patches/0001-Drop-too-short-control-channel-packets-instead-of-as.patch | |
parent | afc11370be9fd149ab361ca183c9715777b50df0 (diff) |
Import Debian changes 2.3.4-5+deb8u2debian/2.3.4-5+deb8u2
openvpn (2.3.4-5+deb8u2) jessie-security; urgency=high
* SECURITY UPDATE: authenticated remote DoS vulnerability due to
packet ID rollover. CVE-2017-7479.
Kudos to Steve Beattie <sbeattie@ubuntu.com> for doing all the backporting
work for this patch.
- debian/patches/CVE-2017-7479-prereq.patch: merge
packet_id_alloc_outgoing() into packet_id_write()
- debian/patches/CVE-2017-7479.patch: do not assert when packet ID
rollover occurs
* SECURITY UPDATE: (Closes: #865480)
- CVE-2017-7508.patch. Fix remotely-triggerable ASSERT() on malformed IPv6
packet.
- CVE-2017-7520.patch. Prevent two kinds of stack buffer OOB reads and a
crash for invalid input data.
- CVE-2017-7521.patch. Fix potential double-free in --x509-alt-username.
- CVE-2017-7521bis.patch. Fix remote-triggerable memory leaks.
Diffstat (limited to 'debian/patches/0001-Drop-too-short-control-channel-packets-instead-of-as.patch')
0 files changed, 0 insertions, 0 deletions