pkgsrc/net/openvpn-acct-wtmpx/distinfo
adam 36d3edc435 openvpn: updated to 2.5.2
The OpenVPN community project team is proud to release OpenVPN 2.5.2. It fixes two related security vulnerabilities (CVE-2020-15078) which under very specific circumstances allow tricking a server using delayed authentication (plugin or management) into returning a PUSH_REPLY before the AUTH_FAILED message, which can possibly be used to gather information about a VPN setup. In combination with “–auth-gen-token” or a user-specific token auth solution it can be possible to get access to a VPN with an otherwise-invalid account. OpenVPN 2.5.2 also includes other bug fixes and improvements. Updated OpenSSL and OpenVPN GUI are included in Windows installers.
2021-04-22 13:53:15 +00:00

11 lines
861 B
Text

$NetBSD: distinfo,v 1.25 2021/04/22 13:53:16 adam Exp $
SHA1 (openvpn-2.5.2.tar.xz) = 95953448917005845e8d3586f93cd5291a0730b6
RMD160 (openvpn-2.5.2.tar.xz) = 4f35090c6595b5ac0afc753e7a85aead43f5ca9a
SHA512 (openvpn-2.5.2.tar.xz) = ae2cac00ae4b9e06e7e70b268ed47d36bbb45409650175e507d5bfa12b0a4f24bccc64f2494d1563f9269c8076d0f753a492f01ea33ce376ba00b7cdcb5c7bd0
Size (openvpn-2.5.2.tar.xz) = 1134644 bytes
SHA1 (openvpn-acct-wtmpx-20130210.tgz) = cf7bc26b12a65493cdf5db93b03bbb938a2f0f33
RMD160 (openvpn-acct-wtmpx-20130210.tgz) = d9000789f04606bfa17db1597a45a4235b1119ea
SHA512 (openvpn-acct-wtmpx-20130210.tgz) = 7b8fd4929e65d8d84158f62e5a17ff3adb3b4a6cff63b29038acfb368750719f2f593786ed9b02402824c19d872b188d2a46740a5c5f853e8873a71481b13aaf
Size (openvpn-acct-wtmpx-20130210.tgz) = 2778 bytes
SHA1 (patch-Makefile) = 4ed829df8d43a6e6b9b0242c749630079a41f5e4