[gnutls-devel] libtasn1 | Potential Buffer Overrun in _asn1_tag_der() (#49)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Thu Mar 7 15:30:46 CET 2024
Simon Josefsson commented: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1805777687
Given that this function only handle 0-3 byte lengths, I think it can be implemented in a more readable style without the double loops, and that we should do that. I haven't been able to convince myself if there ever is any situation where the tag value comes from attacker-controlled data.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/libtasn1/-/issues/49#note_1805777687
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20240307/10966a63/attachment.html>
More information about the Gnutls-devel
mailing list