45f4f6649a
Fixes for security and other issues. See security announcement for more details: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 * Remotely-triggerable ASSERT() on malformed IPv6 packet (CVE-2017-7508) * Pre-authentication remote crash/information disclosure for clients (CVE-2017-7520) * Potential double-free in --x509-alt-username (CVE-2017-7521) * Remote-triggerable memory leaks (CVE-2017-7512) * Post-authentication remote DoS when using the --x509-track option (CVE-2017-7522) * Null-pointer dereference in establish_http_proxy_passthru() * Restrict --x509-alt-username extension types * Fix potential 1-byte overread in TCP option parsing * Fix mbedtls fingerprint calculation * openssl: fix overflow check for long --tls-cipher option * Ensure option array p[] is always NULL-terminated * Pass correct buffer size to GetModuleFileNameW() (Quarkslabs finding 5.6) Signed-off-by: Magnus Kroken <mkroken@gmail.com>
11 lines
412 B
Diff
11 lines
412 B
Diff
--- a/src/openvpn/ssl_mbedtls.c
|
|
+++ b/src/openvpn/ssl_mbedtls.c
|
|
@@ -1336,7 +1336,7 @@ const char *
|
|
get_ssl_library_version(void)
|
|
{
|
|
static char mbedtls_version[30];
|
|
- unsigned int pv = mbedtls_version_get_number();
|
|
+ unsigned int pv = MBEDTLS_VERSION_NUMBER;
|
|
sprintf( mbedtls_version, "mbed TLS %d.%d.%d",
|
|
(pv>>24)&0xff, (pv>>16)&0xff, (pv>>8)&0xff );
|
|
return mbedtls_version;
|