<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>20527</bug_id>
          
          <creation_ts>2009-06-21 23:07:24 +0400</creation_ts>
          <short_desc>CVE-2009-2185 DoS vulnerability in the ASN.1 parser</short_desc>
          <delta_ts>2009-06-25 09:27:01 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>strongswan</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://download.strongswan.org/CHANGES42.txt</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Michael Shigorin">mike</assigned_to>
          <cc>mike</cc>
    
    <cc>oddity</cc>
    
    <cc>week</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>93436</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-06-21 23:07:24 +0400</bug_when>
    <thetext>Applying their fuzzing tool, the Orange Labs vulnerability research team
found a Denial-of-Service vulnerability in the parsing of ASN.1 Relative
Distinguished Names (RDNs). Malformed X.509 certificate RDNs can cause
the pluto and charon IKE daemons to crash and restart.

Fix availiable in the new version 4.2.16</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>93577</commentid>
    <comment_count>1</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2009-06-23 20:10:50 +0400</bug_when>
    <thetext>arbeiten</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>93617</commentid>
    <comment_count>2</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2009-06-24 13:48:06 +0400</bug_when>
    <thetext>strongswan-4.2.16-alt1 -&gt; sisyphus:

* Tue Jun 23 2009 Michael Shigorin &lt;mike@altlinux&gt; 4.2.16-alt1

- 4.2.16 fixes DoS vulnerability in the ASN.1 parser;
  thanks crux@ for notification (closes: #20527)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>93686</commentid>
    <comment_count>3</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-06-25 09:27:01 +0400</bug_when>
    <thetext>closed</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>