+++ This bug was initially created as a clone of Bug #275096 +++ the RDN parser vulnerability discovered by Orange Labs research team two months ago was not completely fixed by the security patch This fix has been integrated into the latest strongSwan releases 2.8.11, 4.2.17, and 4.3.3 available from http://download.strongswan.org/
Fixed in CVS.
Sorry security@gentoo.org, I should not have closed this bug on my own :)
thanks, this can be closed indeed.
CVE-2009-2661 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2661): The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
check-todo-issues put the summary wrong, fixed.