![]() ![]() ![]() (this was a new 2.6 option, with no backend support implemented yet -dns: remove support for exclude-domains argument.(this is due the internal enumeration in OpenSSL being a bit weird, add warning to -show-groups that not all supported groups are listed.add warning if p2p NCP client connects to a p2mp server - this is aĬombination that used to work without cipher negotiation (pre 2.6 onīoth ends), but would fail in non-obvious ways with 2.6 to 2.6.This was a somewhat obsolete featureĪnyway as it only worked with OpenSSL 1.x, which is end-of-support. This had to be removedīecause the original author did not agree to relicensing the code with Remove OpenSSL Engine method for loading a key.Incompatibility between a 2.6.x client connecting to a 2.4.0-2.4.4 server,Īnd the only fix is to use -disable-dco. DCO: warn if DATA_V1 packets are sent by the other side - this a hard.On platforms where division by zero is fatal, this will cause an OpenVPN crash. CVE-2023-46849 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly restore -fragment configuration in some circumstances, leading to a division by zero when -fragment is used.not using -secret) are affected by this issue. CVE-2023-46850 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly use a send buffer after it has been free()d in some circumstances, causing some free()d memory to be sent to the peer.This is a bugfix release containing security fixes. The OpenVPN community project team is proud to release OpenVPN 2.6.7. OpenVPN 2.6.7 - Released 09 November 2023 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |