[gnutls-devel] libtasn1 | Potential Buffer Overrun in _asn1_tag_der() (#49)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Thu Mar 7 15:30:46 CET 2024

Simon Josefsson commented: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1805777687

Given that this function only handle 0-3 byte lengths, I think it can be implemented in a more readable style without the double loops, and that we should do that.  I haven't been able to convince myself if there ever is any situation where the tag value comes from attacker-controlled data.

Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1805777687
You're receiving this email because of your account on gitlab.com.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20240307/10966a63/attachment.html>

More information about the Gnutls-devel mailing list