Browse code

preparing release 2.6.10

version.m4, ChangeLog, Changes.rst

Signed-off-by: Gert Doering <gert@greenie.muc.de>

Gert Doering authored on 2024/03/20 06:19:14
Showing 3 changed files
... ...
@@ -1,6 +1,38 @@
1 1
 OpenVPN ChangeLog
2 2
 Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net>
3 3
 
4
+2024.03.20 -- Version 2.6.10
5
+
6
+Christoph Schug (1):
7
+      Update documentation references in systemd unit files
8
+
9
+Frank Lichtenheld (6):
10
+      Fix typo --data-cipher-fallback
11
+      samples: Remove tls-*.conf
12
+      check_compression_settings_valid: Do not test for LZ4 in LZO check
13
+      t_client.sh: Allow to skip tests
14
+      Update Copyright statements to 2024
15
+      GHA: general update March 2024
16
+
17
+Lev Stipakov (4):
18
+      win32: Enforce loading of plugins from a trusted directory
19
+      interactive.c: disable remote access to the service pipe
20
+      interactive.c: Fix potential stack overflow issue
21
+      Disable DCO if proxy is set via management
22
+
23
+Martin Rys (1):
24
+      openvpn-[client|server].service: Remove syslog.target
25
+
26
+Max Fillinger (1):
27
+      Remove license warning from README.mbedtls
28
+
29
+Selva Nair (1):
30
+      Document that auth-user-pass may be inlined
31
+
32
+wellweek (1):
33
+      remove repetitive words in documentation and comments
34
+
35
+
4 36
 2024.02.11 -- Version 2.6.9
5 37
 
6 38
 Arne Schwabe (15):
... ...
@@ -1,3 +1,54 @@
1
+Overview of changes in 2.6.10
2
+=============================
3
+Security fixes
4
+--------------
5
+- CVE-2024-27459: Windows: fix a possible stack overflow in the
6
+  interactive service component which might lead to a local privilege
7
+  escalation.
8
+  Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
9
+
10
+- CVE-2024-24974: Windows: disallow access to the interactive service
11
+  pipe from remote computers.
12
+  Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
13
+
14
+- CVE-2024-27903: Windows: disallow loading of plugins from untrusted
15
+  installation paths, which could be used to attack openvpn.exe via
16
+  a malicious plugin.  Plugins can now only be loaded from the OpenVPN
17
+  install directory, the Windows system directory, and possibly from
18
+  a directory specified by HKLM\SOFTWARE\OpenVPN\plugin_dir.
19
+  Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
20
+
21
+Bug fixes
22
+---------
23
+- Windows: if the win-dco driver is used (default) and the GUI requests
24
+  use of a proxy server, the connection would fail.  Disable DCO in
25
+  this case.  (Github: #522)
26
+
27
+- Compression: minor bugfix in checking option consistency vs. compiled-in
28
+  algorithm support
29
+
30
+- systemd unit files: remove obsolete syslog.target
31
+
32
+User visible changes
33
+--------------------
34
+- Update copyright notices to 2024
35
+
36
+New features
37
+------------
38
+- t_client.sh can now run pre-tests and skip a test block if needed
39
+  (e.g. skip NTLM proxy tests if SSL library does not support MD4)
40
+
41
+Documentation
42
+-------------
43
+- remove license warnings about mbedTLS linking (README.mbedtls)
44
+
45
+- update documentation references in systemd unit files
46
+
47
+- sample config files: remove obsolete tls-*.conf files
48
+
49
+- document that auth-user-pass may be inlined
50
+
51
+
1 52
 Overview of changes in 2.6.9
2 53
 ============================
3 54
 
... ...
@@ -3,7 +3,7 @@ define([PRODUCT_NAME], [OpenVPN])
3 3
 define([PRODUCT_TARNAME], [openvpn])
4 4
 define([PRODUCT_VERSION_MAJOR], [2])
5 5
 define([PRODUCT_VERSION_MINOR], [6])
6
-define([PRODUCT_VERSION_PATCH], [.9])
6
+define([PRODUCT_VERSION_PATCH], [.10])
7 7
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_MAJOR])
8 8
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_MINOR], [[.]])
9 9
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_PATCH], [[]])