![]() This was a somewhat obsolete featureĪnyway as it only worked with OpenSSL 1.x, which is end-of-support. This had to be removedīecause the original author did not agree to relicensing the code with Remove OpenSSL Engine method for loading a key.Incompatibility between a 2.6.x client connecting to a 2.4.0-2.4.4 server,Īnd the only fix is to use -disable-dco. DCO: warn if DATA_V1 packets are sent by the other side - this a hard.On platforms where division by zero is fatal, this will cause an OpenVPN crash. CVE-2023-46849 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly restore -fragment configuration in some circumstances, leading to a division by zero when -fragment is used.not using -secret) are affected by this issue. CVE-2023-46850 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly use a send buffer after it has been free()d in some circumstances, causing some free()d memory to be sent to the peer.This is a bugfix release containing security fixes. The OpenVPN community project team is proud to release OpenVPN 2.6.7. ![]() OpenVPN 2.6.7 - Released 09 November 2023
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |