[gnutls-devel] GnuTLS | Parsing a certificate containing numerous names or name constraints leads to a DoS attack (#1553)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Thu Feb 13 08:30:48 CET 2025
Alexander Sosedkin commented on a discussion: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2345687023
Looks fine to me!
I've been independently doing the same for 3.6 yesterday, and also struggled with the same reformatting change. If you'd like to return the favour, cross-check patches or their application results, here it is: [gnutls-3.6.16-CVE-2024-12243.patch](/uploads/d316e52b4ce196030ef0c3f1a49f32bd/gnutls-3.6.16-CVE-2024-12243.patch)
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2345687023
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20250213/5e4cb692/attachment-0001.html>
More information about the Gnutls-devel
mailing list