| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | - Backport fix for CVE-2013-2061 to openvpn22 and openvpn20; | Matthias Andree | 2013-06-01 | 1 | -0/+74 |
| | | | | | | | | | | | | | | | | while it is unclear whether it affects OpenSSL-builds at all. Let's play it safe. - Reference CVE-2013-2061 name in OpenVPN's VuXML entry - Mark 2.0.9_4 <= openvpn < 2.1.0 and 2.2.2_2 < openvpn < 2.3.0 not vulnerable - Mark openvpn22 deprecated and to expire 2013-09-01. (openvpn20 is already marked to expire 2013-07-11.) Security: CVE-2013-2061 Security: 92f30415-9935-11e2-ad4c-080027ef73ec Notes: svn path=/head/; revision=319579 | ||||
| * | OpenVPN changes, upgrades and fixes: | Matthias Andree | 2013-01-11 | 6 | -0/+206 |
| - Upgrade security/openvpn to v2.3.0 (changes installed layout a bit), splitting and re-diffing patches. - Retain v2.2.2 as security/openvpn22 - Mark security/openvpn20 as deprecated and to expire 6 months from now - Fix TCP_NODELAY option (openvpn 2.3, 2.2), see <http://community.openvpn.net/openvpn/ticket/158> - Fix PassTOS option (openvpn 2.2, 2.0), see http://community.openvpn.net/openvpn/ticket/135 Notes: svn path=/head/; revision=310252 | |||||
