45f4f6649a
Fixes for security and other issues. See security announcement for more details: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 * Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508) * Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520) * Potential double-free in --x509-alt-username (CVE-2017-7521) * Remote-triggerable memory leaks (CVE-2017-7512) * Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522) * Null-pointer dereference in establish_http_proxy_passthru() * Restrict --x509-alt-username extension types * Fix potential 1-byte overread in TCP option parsing * Fix mbedtls fingerprint calculation * openssl: fix overflow check for long --tls-cipher option * Ensure option array p[] is always NULL-terminated * Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6) Signed-off-by: Magnus Kroken <mkroken@gmail.com>
10 lines
212 B
Diff
10 lines
212 B
Diff
--- a/src/openvpn/options.c
|
|
+++ b/src/openvpn/options.c
|
|
@@ -106,7 +106,6 @@ const char title_string[] =
|
|
#ifdef HAVE_AEAD_CIPHER_MODES
|
|
" [AEAD]"
|
|
#endif
|
|
- " built on " __DATE__
|
|
;
|
|
|
|
#ifndef ENABLE_SMALL
|