Hi Andreas,

On Sat, Feb 08, 2025 at 03:42:47PM +0000, Moritz Mühlenhoff wrote:
> On Sat, Feb 08, 2025 at 01:36:39PM +0100, Andreas Metzler wrote:
> > Control: found -1 4.19.0-1
> > 
> > On 2025-02-07 Salvatore Bonaccorso <car...@debian.org> wrote:
> > [...]
> > > CVE-2024-12133[0]:
> > > | Potential DoS in handling of numerous SEQUENCE OF or SET OF elements
> > 
> > 
> > > If you fix the vulnerability please also make sure to include the
> > > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > > For further information see:
> > 
> > > [0] https://security-tracker.debian.org/tracker/CVE-2024-12133
> > >     https://www.cve.org/CVERecord?id=CVE-2024-12133
> > > [1] https://gitlab.com/gnutls/libtasn1/-/issues/52
> > > [2] https://lists.gnu.org/archive/html/help-libtasn1/2025-02/msg00001.html
> > > [3] 
> > > https://gitlab.com/gnutls/libtasn1/-/commit/4082ca2220b5ba910b546afddf7780fc4a51f75a
> > > [4] 
> > > https://gitlab.com/gnutls/libtasn1/-/commit/869a97aa259dffa2620dabcad84e1c22545ffc3d
> > [...]
> > 
> > Hello Salvatore,
> > 
> > This seems to be straightforward to fix by applying the two patches. The
> > certtool test on the upstream bug report showed the expected speedup
> > with 4.19.0 + the 2 patches.
> 
> Hi Andreas,
> looks good, thanks! Please build with -sa and upload to security-master.

Do we need as well the related gnutls28 fix?

Regards,
Salvatore

Reply via email to