Update to upstream openvpn-2.4.4

Includes fix for possible stack overflow if --key-method 1 is used {CVE-2017-12166}
epel8
David Sommerseth 7 years ago
parent a8edf314d8
commit 95cb196f27
No known key found for this signature in database
GPG Key ID: 8876DD803369EF14

2
.gitignore vendored

@ -50,3 +50,5 @@ openvpn-2.1.2.tar.gz.asc
/openvpn-2.4.2.tar.xz.asc
/openvpn-2.4.3.tar.xz.asc
/openvpn-2.4.3.tar.xz
/openvpn-2.4.4.tar.xz
/openvpn-2.4.4.tar.xz.asc

@ -6,8 +6,8 @@
%bcond_without tests_long
Name: openvpn
Version: 2.4.3
Release: 4%{?prerelease:.%{prerelease}}%{?dist}
Version: 2.4.4
Release: 1%{?prerelease:.%{prerelease}}%{?dist}
Summary: A full-featured SSL VPN solution
URL: https://community.openvpn.net/
Source0: https://swupdate.openvpn.org/community/releases/%{name}-%{version}%{?prerelease:_%{prerelease}}.tar.xz
@ -186,6 +186,10 @@ getent passwd openvpn &>/dev/null || \
%changelog
* Tue Sep 26 2017 David Sommerseth <dazo@eurephia.org> - 2.4.4-1
- Update to latest upstream release
- Includes fix for possible stack overflow if --key-method 1 is used {CVE-2017-12166}
* Fri Aug 4 2017 David Sommerseth <dazo@eurephia.org> - 2.4.3-4
- Change to AES-GCM as the default cipher for server configurations (rhbz#1479270)

@ -1,2 +1,2 @@
SHA512 (openvpn-2.4.3.tar.xz.asc) = 75fdf046e407cf02e30a3f3bd4dbd7e65c34a30e67670f2359b4b0442ee30831e80238539a6e784c28795ba1505ad57dffc8042f1cb472d82754535d50ccfe40
SHA512 (openvpn-2.4.3.tar.xz) = 26d25bb71c5ecfa398924b3ee3dec16b2776b3d67cf0b532c2b8a4368f1307bbd04b80ed38f0344c313aab38ec6e4e4f9bf2b3bc90bc197b2f257288e72eb5d8
SHA512 (openvpn-2.4.4.tar.xz) = c171d1243ab739310247f076483592758e71f810f7b29b507d3a67b86b3b87e1e854d240d25a3428a7b31b7cf2958ad17987d32151da6ed7ec27d698837d3273
SHA512 (openvpn-2.4.4.tar.xz.asc) = a6b462bd71e0e8b4d0b985bed4b0c231bff70ce1ba5bf6623625ea5254d6e73c0646731e67d0cb06edf0eac09a275279c3ce2fa8cde60be717659ed0af0279dd

Loading…
Cancel
Save