pkgsrc/net/openvpn-nagios/distinfo
adam 36d3edc435 openvpn: updated to 2.5.2
The OpenVPN community project team is proud to release OpenVPN 2.5.2. It fixes two related security vulnerabilities (CVE-2020-15078) which under very specific circumstances allow tricking a server using delayed authentication (plugin or management) into returning a PUSH_REPLY before the AUTH_FAILED message, which can possibly be used to gather information about a VPN setup. In combination with “–auth-gen-token” or a user-specific token auth solution it can be possible to get access to a VPN with an otherwise-invalid account. OpenVPN 2.5.2 also includes other bug fixes and improvements. Updated OpenSSL and OpenVPN GUI are included in Windows installers.
2021-04-22 13:53:15 +00:00

12 lines
918 B
Text

$NetBSD: distinfo,v 1.22 2021/04/22 13:53:16 adam Exp $
SHA1 (openvpn-2.5.2.tar.xz) = 95953448917005845e8d3586f93cd5291a0730b6
RMD160 (openvpn-2.5.2.tar.xz) = 4f35090c6595b5ac0afc753e7a85aead43f5ca9a
SHA512 (openvpn-2.5.2.tar.xz) = ae2cac00ae4b9e06e7e70b268ed47d36bbb45409650175e507d5bfa12b0a4f24bccc64f2494d1563f9269c8076d0f753a492f01ea33ce376ba00b7cdcb5c7bd0
Size (openvpn-2.5.2.tar.xz) = 1134644 bytes
SHA1 (openvpn-nagios-20130210.tgz) = 8a0fd4e3eba27584aa53c5589c13d4b38af43ba2
RMD160 (openvpn-nagios-20130210.tgz) = 2a47893ec2db2c280adc7b9fbbea97794ec1a6f4
SHA512 (openvpn-nagios-20130210.tgz) = 80e565f32379c39eb6c7f3b4744af221ae882ff07dce9dae5bd7feb73b0edcfc7c7ac7f70d23fdcd4f492b66f095f09833deb122449840b36ea606ce91900358
Size (openvpn-nagios-20130210.tgz) = 3034 bytes
SHA1 (patch-Makefile) = accc6a2a49530a504897451f2a2f45c528b7b131
SHA1 (patch-openvpn-nagios.c) = 36e9ee6e652051b3b047710666998052bef637db