[gnutls-devel] libtasn1 | Potential Buffer Overrun in _asn1_tag_der() (#49)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Tue Feb 27 08:41:28 CET 2024

Simon Josefsson commented: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1790536153

For this to be triggered, `tag_value` has to be quite large -- maybe the function should do a `ETYPE_OK(tag_value)` before using it.  Several of the callers do something like that already, so it is not clear it is easily exploitable.

Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1790536153
You're receiving this email because of your account on gitlab.com.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20240227/0693115a/attachment-0001.html>

More information about the Gnutls-devel mailing list