Package: newpki-client Severity: serious Tags: security Hi,
I was looking at return codes for applications making use of openssl functions and found this: src/DlgShowLog.cpp: if(!LOG_ENTRY_verify(lValue, (EVP_PKEY *)m_EntityCert.GetPublicKey())) LOG_ENTRY_verify() is a function from libnewpki that does: #define LOG_ENTRY_verify(x,pkey) \ ASN1_item_verify(LogEntryBody::get_ASN1_ITEM(), x->sig->sig_alg, x->sig->signature,(char *)x->body, pkey) ASN1_item_verify() can return -1 in case the message digest type is not known or there is an out of memory condition. I have no idea if this can be a problem and what the security implications are. If the attacker can not specify the certificate that is being used there probably isn't any serious problem. Kurt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org