OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src                      Date:   02-Nov-2005 17:46:02
  Branch: OPENPKG_2_4_SOLID                Handle: 2005110216455801

  Modified files:           (Branch: OPENPKG_2_4_SOLID)
    openpkg-src/openvpn     openvpn.patch openvpn.spec

  Log:
    apply security fixes (CVE-2005-3393, CVE-2005-3409)

  Summary:
    Revision    Changes     Path
    1.2.2.1     +71 -0      openpkg-src/openvpn/openvpn.patch
    1.46.2.2    +1  -1      openpkg-src/openvpn/openvpn.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/openvpn/openvpn.patch
  ============================================================================
  $ cvs diff -u -r1.2 -r1.2.2.1 openvpn.patch
  --- openpkg-src/openvpn/openvpn.patch 22 May 2005 08:59:59 -0000      1.2
  +++ openpkg-src/openvpn/openvpn.patch 2 Nov 2005 16:45:58 -0000       1.2.2.1
  @@ -62,3 +62,74 @@
            exit 0;
        }
        }
  +
  +-----------------------------------------------------------------------------
  +
  +Security fix (CVE-2005-3393)
  +
  +Affects non-Windows OpenVPN clients of version 2.0 or higher which
  +connect to a malicious or compromised server. A format string
  +vulnerability in the foreign_option function in options.c could
  +potentially allow a malicious or compromised server to execute arbitrary
  +code on the client. Only non-Windows clients are affected. The
  +vulnerability only exists if (a) the client's TLS negotiation with the
  +server succeeds, (b) the server is malicious or has been compromised
  +such that it is configured to push a maliciously crafted options string
  +to the client, and (c) the client indicates its willingness to accept
  +pushed options from the server by having "pull" or "client" in its
  +configuration file.
  +
  +Index: options.c
  +--- options.c        2005-08-04 09:16:27 +0200
  ++++ options.c        2005-11-01 12:06:11 +0100
  +@@ -2108,7 +2108,7 @@
  +         {
  +           if (!first)
  +             buf_printf (&value, " ");
  +-          buf_printf (&value, argv[i]);
  ++          buf_printf (&value, "%s", argv[i]);
  +           first = false;
  +         }
  +     }
  +
  +-----------------------------------------------------------------------------
  +
  +Security fix (CVE-2005-3409)
  +
  +Potential DoS vulnerability on the server in TCP mode. If the TCP server
  +accept() call returns an error status, the resulting exception handler
  +may attempt to indirect through a NULL pointer, causing a segfault.
  +Affects all OpenVPN 2.0 versions.
  +
  +Index: socket.c
  +--- socket.c 2005-08-21 09:06:36 +0200
  ++++ socket.c 2005-11-01 20:28:32 +0100
  +@@ -1029,9 +1029,16 @@
  +   struct gc_arena gc = gc_new ();
  +   const char *remote_dynamic = NULL;
  +   bool remote_changed = false;
  ++  int sig_save = 0;
  + 
  +   ASSERT (sock);
  + 
  ++  if (signal_received && *signal_received)
  ++    {
  ++      sig_save = *signal_received;
  ++      *signal_received = 0;
  ++    }
  ++
  +   /* initialize buffers */
  +   socket_frame_init (frame, sock);
  + 
  +@@ -1223,6 +1230,11 @@
  +        print_sockaddr_ex (&sock->info.lsa->actual, addr_defined 
(&sock->info.lsa->actual), ":", &gc));
  + 
  +  done:
  ++  if (sig_save && signal_received)
  ++    {
  ++      if (!*signal_received)
  ++    *signal_received = sig_save;
  ++    }
  +   gc_free (&gc);
  + }
  + 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openvpn/openvpn.spec
  ============================================================================
  $ cvs diff -u -r1.46.2.1 -r1.46.2.2 openvpn.spec
  --- openpkg-src/openvpn/openvpn.spec  15 Jun 2005 19:01:25 -0000      1.46.2.1
  +++ openpkg-src/openvpn/openvpn.spec  2 Nov 2005 16:45:59 -0000       1.46.2.2
  @@ -37,7 +37,7 @@
   Group:        Network
   License:      GPL
   Version:      %{V_opkg}
  -Release:      2.4.0
  +Release:      2.4.1
   
   #   package options
   %option       with_fsl  yes
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to