36d3edc435
The OpenVPN community project team is proud to release OpenVPN 2.5.2. It fixes two related security vulnerabilities (CVE-2020-15078) which under very specific circumstances allow tricking a server using delayed authentication (plugin or management) into returning a PUSH_REPLY before the AUTH_FAILED message, which can possibly be used to gather information about a VPN setup. In combination with “–auth-gen-token” or a user-specific token auth solution it can be possible to get access to a VPN with an otherwise-invalid account. OpenVPN 2.5.2 also includes other bug fixes and improvements. Updated OpenSSL and OpenVPN GUI are included in Windows installers.
12 lines
918 B
Text
12 lines
918 B
Text
$NetBSD: distinfo,v 1.22 2021/04/22 13:53:16 adam Exp $
|
|
|
|
SHA1 (openvpn-2.5.2.tar.xz) = 95953448917005845e8d3586f93cd5291a0730b6
|
|
RMD160 (openvpn-2.5.2.tar.xz) = 4f35090c6595b5ac0afc753e7a85aead43f5ca9a
|
|
SHA512 (openvpn-2.5.2.tar.xz) = ae2cac00ae4b9e06e7e70b268ed47d36bbb45409650175e507d5bfa12b0a4f24bccc64f2494d1563f9269c8076d0f753a492f01ea33ce376ba00b7cdcb5c7bd0
|
|
Size (openvpn-2.5.2.tar.xz) = 1134644 bytes
|
|
SHA1 (openvpn-nagios-20130210.tgz) = 8a0fd4e3eba27584aa53c5589c13d4b38af43ba2
|
|
RMD160 (openvpn-nagios-20130210.tgz) = 2a47893ec2db2c280adc7b9fbbea97794ec1a6f4
|
|
SHA512 (openvpn-nagios-20130210.tgz) = 80e565f32379c39eb6c7f3b4744af221ae882ff07dce9dae5bd7feb73b0edcfc7c7ac7f70d23fdcd4f492b66f095f09833deb122449840b36ea606ce91900358
|
|
Size (openvpn-nagios-20130210.tgz) = 3034 bytes
|
|
SHA1 (patch-Makefile) = accc6a2a49530a504897451f2a2f45c528b7b131
|
|
SHA1 (patch-openvpn-nagios.c) = 36e9ee6e652051b3b047710666998052bef637db
|