[gnutls-devel] GnuTLS | Parsing a certificate containing numerous names or name constraints leads to a DoS attack (#1553)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Thu Feb 13 08:30:48 CET 2025




Alexander Sosedkin commented on a discussion: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2345687023


Looks fine to me!

I've been independently doing the same for 3.6 yesterday, and also struggled with the same reformatting change. If you'd like to return the favour, cross-check patches or their application results, here it is: [gnutls-3.6.16-CVE-2024-12243.patch](/uploads/d316e52b4ce196030ef0c3f1a49f32bd/gnutls-3.6.16-CVE-2024-12243.patch)

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2345687023
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20250213/5e4cb692/attachment-0001.html>


More information about the Gnutls-devel mailing list