Cisco Bug: CSCvv58605 - ASA traceback and reload in thread:Crypto CA,mem corruption by unvirtualized pki global table in MTX
Oct 07, 2020
- Cisco ASA 5500-X Series Firewalls
Known Affected Releases
Symptom: ASA traceback and reload in thread: Crypto CA Memory corruption caused due to the use of a single global unvirutalized pki global table in multi context mode. Conditions: First seen on: > ASA configured with RA VPN on release 188.8.131.52 Condition is a special case in multi-context mode. We were using a single global pki table across all the user contexts in multi context mode which might cause a collision for crypto ca pki request ids in this very table. This happened in the customer case where they have RA VPN going on in multiple contexts with OCSP revocation check.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases