Package: root-system
Severity: serious
Tags: security

Hi,

I was looking at return codes for applications making use of
openssl functions and found this in
xrootd/src/xrootd/src/XrdCrypto/XrdCryptosslX509Req.cc:
bool XrdCryptosslX509Req::Verify()
{
[...]
   return X509_REQ_verify(creq,X509_REQ_get_pubkey(creq));
}

X509_REQ_verify() is a function that returns the value of
ASN1_item_verify() which can return -1 in case the message
digest type is not known or there is an out of memory condition.

I have no idea what how this is used exactly or what the
consequences of this are.

If the attacker can not specify the certificate that is being
used there probably isn't any serious problem.


Kurt




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to