Package: aeskeyfind
Version: 1:1.0-8
Severity: important
Tags: upstream

Dear Maintainer,

I was in the process of creating autopkgtests for aeskeyfind and discovered, 
that using aeskeyfind with kernel 5.10.0.6 and glibc 2.31-11 leads to wrong 
results. Existing AES-keys are not found, although they are and extracted by 
aeskeyfind on kernel 5.4.0.73 and glibc 2.27 at least. Further testing 
revelead, that the values of the variables named xor_count_128 and 
xor_count_256 are higher in the failing setup. This seems to stem from the 
following two functions: 

https://salsa.debian.org/pkg-security-team/aeskeyfind/-/blob/debian/master/util.h#L25
https://salsa.debian.org/pkg-security-team/aeskeyfind/-/blob/debian/master/util.h#L25

Unfortunately there is no upstream maintainer, so that I file a bug on Debian's 
BTS, since it is a serious issue for the functionality of the package.
A temporary workaround is to set the threshold higher to overcome the 
miscalculated xor_count_*. 

Best regards,
Jan 

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-6-amd64 (SMP w/1 CPU thread)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages aeskeyfind depends on:
ii  libc6  2.31-11

aeskeyfind recommends no packages.

aeskeyfind suggests no packages.

-- no debconf information

Reply via email to