[This is my second attempt to send this email; the first one never appeared in 
RT or in the openssl-dev archive ]

This bug report applies to 0.9.7k and 0.9.8c (it involves the security
fix that caused those releases).

I think that the recent fix for CVE-2006-4339 contains a bug in the
change to rsa_eay.c.  That fix added a stricter padding check to rsa_eay.c.
The problem is that when this new padding check determines that there
is an error, it goes to the "err" label with a positive value in "r" (which
is used for the return value).  "r" should be explicitly set to a negative
value before this goto (because the public decrypt API is supposed to return
a negative number on failure).

-Ivan Nestlerode

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to