Your message dated Mon, 02 Feb 2009 12:17:14 +0000
with message-id <e1ltxjm-0005c0...@ries.debian.org>
and subject line Bug#513514: fixed in newpki-client 2.0.0+rc1-4
has caused the Debian Bug report #513514,
regarding newpki-client: Does not properly check the LOG_ENTRY_verify return
value.
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
513514: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: newpki-client
Severity: serious
Tags: security
Hi,
I was looking at return codes for applications making use of
openssl functions and found this:
src/DlgShowLog.cpp: if(!LOG_ENTRY_verify(lValue, (EVP_PKEY
*)m_EntityCert.GetPublicKey()))
LOG_ENTRY_verify() is a function from libnewpki that does:
#define LOG_ENTRY_verify(x,pkey) \
ASN1_item_verify(LogEntryBody::get_ASN1_ITEM(), x->sig->sig_alg,
x->sig->signature,(char *)x->body, pkey)
ASN1_item_verify() can return -1 in case the message digest type is
not known or there is an out of memory condition.
I have no idea if this can be a problem and what the security
implications are.
If the attacker can not specify the certificate that is being
used there probably isn't any serious problem.
Kurt
--- End Message ---
--- Begin Message ---
Source: newpki-client
Source-Version: 2.0.0+rc1-4
We believe that the bug you reported is fixed in the latest version of
newpki-client, which is due to be installed in the Debian FTP archive:
newpki-client_2.0.0+rc1-4.diff.gz
to pool/main/n/newpki-client/newpki-client_2.0.0+rc1-4.diff.gz
newpki-client_2.0.0+rc1-4.dsc
to pool/main/n/newpki-client/newpki-client_2.0.0+rc1-4.dsc
newpki-client_2.0.0+rc1-4_amd64.deb
to pool/main/n/newpki-client/newpki-client_2.0.0+rc1-4_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 513...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Pierre Chifflier <pol...@debian.org> (supplier of updated newpki-client package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 02 Feb 2009 12:59:08 +0100
Source: newpki-client
Binary: newpki-client
Architecture: source amd64
Version: 2.0.0+rc1-4
Distribution: unstable
Urgency: low
Maintainer: Pierre Chifflier <pol...@debian.org>
Changed-By: Pierre Chifflier <pol...@debian.org>
Description:
newpki-client - PKI based on the OpenSSL low-level API (client package)
Closes: 513514
Changes:
newpki-client (2.0.0+rc1-4) unstable; urgency=low
.
* Check LOG_ENTRY_verify return value (Closes: #513514)
Checksums-Sha1:
3a54653e8aa7a5997bbb458ac4e2a7bda9b8cd1d 1134 newpki-client_2.0.0+rc1-4.dsc
09b14537bea5eaff93cb366632cb0034ac428d9d 116404
newpki-client_2.0.0+rc1-4.diff.gz
80fd8e604adac335514bd88c3a95734ef7a3fbff 548546
newpki-client_2.0.0+rc1-4_amd64.deb
Checksums-Sha256:
3a4d75b6e3d4b2c240d1ceffb182f05a79616f6ea674f5b1710716a48963062f 1134
newpki-client_2.0.0+rc1-4.dsc
32a7960e72958ce4f59a4b1aa6acb5356cb77c9c48cbd6f2a57292136714f55b 116404
newpki-client_2.0.0+rc1-4.diff.gz
4b1ca8df127252b4a74e713e8f3af5549689bad2e0f47103cb30b2f89a1be137 548546
newpki-client_2.0.0+rc1-4_amd64.deb
Files:
779e51b5169ed43abc41ff67bdfa41bd 1134 net optional
newpki-client_2.0.0+rc1-4.dsc
8d58fb27f6116a64bd47dde633a45498 116404 net optional
newpki-client_2.0.0+rc1-4.diff.gz
94331896cb356873502a8655db3c0423 548546 net optional
newpki-client_2.0.0+rc1-4_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJhuPatwVrWo1fQMsRAhmNAJ9UEwdhVFRHXw3UD7imIMlRjejGTgCghxzL
IQ7wEWKkohmFaDtm6VF4m38=
=g/G5
-----END PGP SIGNATURE-----
--- End Message ---