[gnutls-devel] GnuTLS | Parsing a certificate containing numerous names or name constraints leads to a DoS attack (#1553)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Sat Feb 15 15:53:08 CET 2025




Andreas Metzler commented on a discussion: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2349709875


This is more involved than the changes for 3.7, due to the gnulib changes [INT_(MULTIPLY|ADD)_OK missing, replaced by coding using _OVERFLOW], ditto for _gnutls_reallocarray. I assume you got these pieces right. Apart from that it looks good to me and the obvious checks, (certtool -i and -e with the cert in this report) show the fix working.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1553#note_2349709875
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20250215/3d3d04b2/attachment-0001.html>


More information about the Gnutls-devel mailing list