Package: openvpn / 2.3.4-5+deb8u2
Metadata
Package | Version | Patches format |
---|---|---|
openvpn | 2.3.4-5+deb8u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
auth pam_libpam_so_filename.patch | (download) |
src/plugins/auth-pam/auth-pam.c |
2 1 + 1 - 0 ! |
fix libpam.so filename to /lib/libpam.so.0 in pam plugin |
close_socket_before_scripts.patch | (download) |
src/openvpn/socket.c |
8 4 + 4 - 0 ! |
set socket's fd_cloexec flag before calling up script Moving the set_cloexec() call from link_socket_init_phase2() to link_socket_init_phase1(). |
debian_nogroup_for_sample_files.patch | (download) |
sample/sample-config-files/client.conf |
2 1 + 1 - 0 ! |
unpriviledged group in debian is called nogroup instead of nobody |
openvpn pkcs11warn.patch | (download) |
src/openvpn/options.c |
14 14 + 0 - 0 ! |
warn users about deprecated pkcs11 options |
route_default_nil.patch | (download) |
doc/openvpn.8 |
2 1 + 1 - 0 ! |
fix small wording in man page. |
kfreebsd_support.patch | (download) |
src/openvpn/route.c |
2 1 + 1 - 0 ! |
improve kfreebsd support |
accommodate_typo.patch | (download) |
src/openvpn/occ.c |
2 1 + 1 - 0 ! |
simple spelling fix |
manpage_fixes.patch | (download) |
doc/openvpn.8 |
44 22 + 22 - 0 ! |
man page fixes |
better_systemd_detection.patch | (download) |
src/openvpn/console.c |
9 2 + 7 - 0 ! |
improved systemd detection for password prompt |
client_connect_tmp_files.patch | (download) |
src/openvpn/multi.c |
14 10 + 4 - 0 ! |
--- |
0001 Drop too short control channel packets instead of as.patch | (download) |
src/openvpn/ssl.c |
6 5 + 1 - 0 ! |
[patch] drop too-short control channel packets instead of asserting out. This fixes a denial-of-service vulnerability where an authenticated client could stop the server by triggering a server-side ASSERT(). OpenVPN would previously ASSERT() that control channel packets have a payload of at least 4 bytes. An authenticated client could trigger this assert by sending a too-short control channel packet to the server. Thanks to Dragana Damjanovic for reporting the issue. This bug has been assigned CVE-2014-8104. Signed-off-by: Steffan Karger <steffan.karger@fox-it.com> |
update_sample_certs.patch | (download) |
sample/sample-keys/ca.crt |
48 32 + 16 - 0 ! |
--- |
CVE 2017 7479 prereq.patch | (download) |
src/openvpn/crypto.c |
12 3 + 9 - 0 ! |
[patch] cleanup: merge packet_id_alloc_outgoing() into packet_id_write() The functions packet_id_alloc_outgoing() and packet_id_write() were always called in tandem. Instead of forcing the caller to allocate a packet_id_net to do so, merge the two functions. This simplifies the API and reduces the chance on mistakes in the future. This patch adds unit tests to verify the behaviour of packet_id_write(). Verifying that we assert out correctly required the change to mock_msg.c. This patch was cherry-picked from a87e1431 (master). Signed-off-by: Steffan Karger <steffan.karger@fox-it.com> |
CVE 2017 7479.patch | (download) |
src/openvpn/crypto.c |
15 11 + 4 - 0 ! |
[patch 2/2] drop packets instead of asserting out if packet id rolls over MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Previously, if a mode was selected where packet ids are not allowed to roll over, but renegotiation does not succeed for some reason (e.g. no password entered in time, certificate expired or a malicious peer that refuses the renegotiaion on purpose) we would continue to use the old keys. Until the packet ID would roll over and we would ASSERT() out. Given that this can be triggered on purpose by an authenticated peer, this is a fix for an authenticated remote DoS vulnerability. An attack is rather inefficient though; a peer would need to get us to send 2^32 packets (min-size packet is IP+UDP+OPCODE+PID+TAG (no payload), results in (20+8+1+4+16)2^32 bytes, or approx. 196 GB). Signed-off-by: Steffan Karger <steffan.karger@fox-it.com> CVE-2017-7479 [Ubuntu note: 2.3.x does not support tlscrypt, so that portion of patch was dropped; other backporting to 2.3.x]. --sbeattie |
CVE 2017 7521.patch | (download) |
src/openvpn/ssl_verify_openssl.c |
5 4 + 1 - 0 ! |
--- |
CVE 2017 7521bis.patch | (download) |
src/openvpn/ssl_verify_openssl.c |
9 4 + 5 - 0 ! |
--- |
CVE 2017 7520.patch | (download) |
src/openvpn/ntlm.c |
10 8 + 2 - 0 ! |
--- |
CVE 2017 7508.patch | (download) |
src/openvpn/mss.c |
11 9 + 2 - 0 ! |
--- |