Good evening Mr. Wagner,

Thank you very much.

We have not validated a scenario like you mention. Our use cases, related to 
this XML signature generation, are not susceptible to exploit such 
vulnerability; but I think it could be possible in other use cases. In our use 
case, we experience inestability of the system due to an unpredictable 
segmentation fault in the library.

Thanks,
Alejandro.

Get Outlook for Android<https://aka.ms/ghei36>

________________________________
From: Ferenc Wagner,,, <wf...@niif.hu> on behalf of wf...@niif.hu 
<wf...@niif.hu>
Sent: Sunday, February 24, 2019 2:17:03 PM
To: Alejandro Claro Mosqueda
Cc: 922...@bugs.debian.org
Subject: Re: Bug#922984: xml-security-c: ECDSA XML signature generation 
segmentation fault

Alejandro Claro <alejandro.cl...@smartmatic.com> writes:

> We found a bug in Apache Santuario C, related to ECDSA signature
> generation, few years ego. We provide the fix to the Apache team, and
> Scott Cantor kindly accepted the fix in the project. How ever the fix
> was introduced in series 2.x of the the library.

Dear Alejandro,

I can propose your fix for the next stable update, but I don't know when
that will be released.  On the other hand, if this buffer overflow leads
to an exploitable vulnerability, the Security Team could fast-track the
fix.  Have you got such a scenario?
--
Thanks,
Feri

Reply via email to