Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2
Simon Josefsson
simon at josefsson.org
Wed Nov 12 10:15:17 UTC 2008
Michael Meskes <meskes at debian.org> writes:
> On Tue, Nov 11, 2008 at 04:55:57PM +0100, Simon Josefsson wrote:
>> I think we have identified the problem, see:
>>
>> http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3216/focus=3230
>>
>> That patch at least solves the vulnerability and the crash, so possibly
>> it could be uploaded to debian to avoid further troubles until we have
>> released a 2.6.2 with a good fix.
>
> You mean just removing this code snippet instead of moving it?
>
> /* Check if the last certificate in the path is self signed.
> * In that case ignore it (a certificate is trusted only if it
> * leads to a trusted party by us, not the server's).
> */
> if (gnutls_x509_crt_check_issuer (certificate_list[clist_size - 1],
> certificate_list[clist_size - 1]) > 0
> && clist_size > 0)
> {
> clist_size--;
> }
Yes.
> Yes, this works. However, I wonder whether this code has any use.
Getting Nikos' comment on this would be useful. I guess we have two
choices:
1) Remove the code. Fixes both crash and vulnerability.
2) Change the test to clist_size>1. Fixes both crash and vulnerability.
> If so, wouldn't it help to just use "clist_size > 1" instead of
> "clist_size > 0"? The > 0 test is bogus if you access clist_size - 1
> afterwards, but with the > 1 test it works for me as well, i.e. no
> segfault anymore.
Yes, that version of the patch works too. I'm not sure what the
semantic differences are between the two patches.
/Simon
More information about the Pkg-gnutls-maint
mailing list