<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>30529</bug_id>
          
          <creation_ts>2014-12-02 14:24:57 +0300</creation_ts>
          <short_desc>CVE-2014-8104 Critical denial of service vulnerability in OpenVPN servers</short_desc>
          <delta_ts>2015-01-17 16:28:21 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>openvpn</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>https://security-tracker.debian.org/tracker/CVE-2014-8104</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Mike Lykov">combr</reporter>
          <assigned_to name="Nikolay A. Fetisov">naf</assigned_to>
          <cc>mike</cc>
    
    <cc>naf</cc>
    
    <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>149147</commentid>
    <comment_count>0</comment_count>
    <who name="Mike Lykov">combr</who>
    <bug_when>2014-12-02 14:24:57 +0300</bug_when>
    <thetext>Dragana Damjanovic discovered that an authenticated client could crash
an OpenVPN server by sending a control packet containing less than
four bytes as payload.

удаленное использование ошибки возможно для вызова падения сервера, надо бы версию обновить (а то Built: almost 3 years ago)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>149155</commentid>
    <comment_count>1</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2014-12-03 13:09:20 +0300</bug_when>
    <thetext>Как вариант, задокументировать реализацию gear-репозитория с переносом апстримных исходников в подкаталог -- вчера сходу не сообразил.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>149705</commentid>
    <comment_count>2</comment_count>
    <who name="Anton Farygin">rider</who>
    <bug_when>2015-01-15 17:45:05 +0300</bug_when>
    <thetext>ping мейнтейнер ?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>149723</commentid>
    <comment_count>3</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2015-01-15 21:27:58 +0300</bug_when>
    <thetext>См. тж. bug #30319</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>149726</commentid>
    <comment_count>4</comment_count>
    <who name="Nikolay A. Fetisov">naf</who>
    <bug_when>2015-01-15 21:37:51 +0300</bug_when>
    <thetext>До OpenVPN добрался, сегодня обновлю.
Вместе с закрытием #30614 и #28071</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>149757</commentid>
    <comment_count>5</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2015-01-17 16:28:21 +0300</bug_when>
    <thetext>openvpn-2.3.6-alt1 -&gt; sisyphus:

* Thu Jan 15 2015 Nikolay A. Fetisov &lt;naf@altlinux&gt; 2.3.6-alt1
- New version 2.3.6
- CVE-2014-8104 (Closes: 30529)
- Adding pkcs11 support (Closes: 30614)
- Adding systemd service files (Closes: 28071)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>