|
|
Message-ID: <20081014125400.GG17682@suse.de>
Date: Tue, 14 Oct 2008 14:54:00 +0200
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Cc: coley@...re.org
Subject: CVE request: strongswam denial-of-service
Hi,
our maintainer of strongswan found this:
See also http://download.strongswan.org/CHANGES4.txt
"[...]
strongswan-4.2.7
----------------
- Fixed a Denial-of-Service vulnerability where an IKE_SA_INIT message with
a KE payload containing zeroes only can cause a crash of the IKEv2 charon
daemon due to a NULL pointer returned by the mpz_export() function of the
GNU Multiprecision Library (GMP). Thanks go to Mu Dynamics Research Labs
for making us aware of this problem.
[...]"
patch: http://trac.strongswan.org/changeset/4345Hi,
--
Bye,
Thomas
--
Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
--
Hamming's Motto:
The purpose of computing is insight, not numbers.
-- Richard W. Hamming
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.