aboutsummaryrefslogtreecommitdiffstats
path: root/security/openvpn/files
diff options
context:
space:
mode:
authorgarga <garga@FreeBSD.org>2006-04-05 22:57:25 +0800
committergarga <garga@FreeBSD.org>2006-04-05 22:57:25 +0800
commitea1b4212eb60d8fe7bb04d69e9c57015968a7d7d (patch)
tree0e86cad6bc7fa2fd3fb822c518047aa96cddf2ef /security/openvpn/files
parent2856ecd66d28cd091d0e7b85ebeffff91ee0114b (diff)
downloadfreebsd-ports-gnome-ea1b4212eb60d8fe7bb04d69e9c57015968a7d7d.tar.gz
freebsd-ports-gnome-ea1b4212eb60d8fe7bb04d69e9c57015968a7d7d.tar.zst
freebsd-ports-gnome-ea1b4212eb60d8fe7bb04d69e9c57015968a7d7d.zip
- Update to 2.0.6
* security fix for client LD_PRELOAD code injection vulnerability through compromised upstream servers (FreeBSD VuXML Vuln VID be4ccb7b-c48b-11da-ae12-0002b3b60e4c, filed in separate PR) CVE id not known yet * 2 other changes only relevant for Linux and NetBSD, not detailed here. PR: ports/95345 Submitted by: maintainer Security: VuXML be4ccb7b-c48b-11da-ae12-0002b3b60e4c
Diffstat (limited to 'security/openvpn/files')
-rw-r--r--security/openvpn/files/patch-tests-for-jail67
1 files changed, 0 insertions, 67 deletions
diff --git a/security/openvpn/files/patch-tests-for-jail b/security/openvpn/files/patch-tests-for-jail
deleted file mode 100644
index 6a0e72746ab6..000000000000
--- a/security/openvpn/files/patch-tests-for-jail
+++ /dev/null
@@ -1,67 +0,0 @@
---- t_lpback.sh~
-+++ t_lpback.sh
-@@ -19,11 +19,13 @@
- # 02110-1301, USA.
-
- set -e
--trap "rm -f key.$$ log.$$ ; false" 1 2 3 15
-+trap "rm -f key.$$ log.$$ ; trap 0 ; exit 77" 1 2 15
-+trap "rm -f key.$$ log.$$ ; exit 1" 0 3
- ./openvpn --genkey --secret key.$$
- set +e
- ( ./openvpn --test-crypto --secret key.$$ ) >log.$$ 2>&1
- e=$?
- if [ $e != 0 ] ; then cat log.$$ ; fi
--rm key.$$
-+rm key.$$ log.$$
-+trap 0
- exit $e
---- t_cltsrv.sh~
-+++ t_cltsrv.sh
-@@ -19,20 +19,41 @@
- # 02110-1301, USA.
-
- set -e
-+trap "rm -f log.$$ log.$$.signal ; trap 0 ; exit 77" 1 2 15
-+trap "rm -f log.$$ log.$$.signal ; exit 1" 0 3
-+addopts=
-+case `uname -s` in
-+ FreeBSD)
-+ # FreeBSD jails map the outgoing IP to the jail IP - we need to
-+ # allow the real IP unless we want the test to run forever.
-+ if test "`sysctl 2>/dev/null -n security.jail.jailed`" = 1 \
-+ || ps -ostate= -p $$ | grep -q J; then
-+ addopts="--float"
-+ if test "x`ifconfig | grep inet`" = x ; then
-+ echo "###"
-+ echo "### To run the test in a FreeBSD jail, you MUST add an IP alias for the jail's IP."
-+ echo "###"
-+ exit 1
-+ fi
-+ fi
-+ ;;
-+esac
- echo "the following test will run about two minutes..." >&2
--trap "rm -f log.$$ ; false" 1 2 3 15
- set +e
- (
--./openvpn --cd "${srcdir}" --config sample-config-files/loopback-server &
--./openvpn --cd "${srcdir}" --config sample-config-files/loopback-client
--) >log.$$ 2>&1
-+./openvpn --cd "${srcdir}" ${addopts} --down 'echo "srv:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-server &
-+./openvpn --cd "${srcdir}" ${addopts} --down 'echo "clt:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-client
-+) 3>log.$$.signal >log.$$ 2>&1
- e1=$?
- wait $!
- e2=$?
-+grep -v ":inactive$" log.$$.signal >/dev/null && { cat log.$$.signal ; echo ; cat log.$$ ; exit 1 ; }
-+
- set -e
-
- if [ $e1 != 0 ] || [ $e2 != 0 ] ; then
- cat log.$$
- exit 1
- fi
--rm log.$$
-+rm log.$$ log.$$.signal
-+trap 0