[Commits] [SCM] claws branch, master, updated. 4.3.1-29-g112daeb1b

wwp at claws-mail.org wwp at claws-mail.org
Wed Mar 5 20:18:44 UTC 2025


The branch, master has been updated
       via  112daeb1bbc0233809f79d61efbb49ba35821d4a (commit)
      from  1e87622ac8f04e1f4bf00cf8516425bff141a911 (commit)

Summary of changes:
 src/common/ssl.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)


- Log -----------------------------------------------------------------
commit 112daeb1bbc0233809f79d61efbb49ba35821d4a
Author: wwp <subscript at free.fr>
Date:   Wed Mar 5 21:18:22 2025 +0100

    Fix CID 1220354: Overflowed constant (INTEGER_OVERFLOW)

diff --git a/src/common/ssl.c b/src/common/ssl.c
index 1eafe3f6e..15745ca09 100644
--- a/src/common/ssl.c
+++ b/src/common/ssl.c
@@ -337,19 +337,19 @@ static gint SSL_connect_nb(gnutls_session_t ssl)
 #endif
 }
 
-gnutls_x509_crt_t *ssl_get_certificate_chain(gnutls_session_t session, gint *list_len)
+gnutls_x509_crt_t *ssl_get_certificate_chain(gnutls_session_t session, unsigned int *list_len)
 {
 	const gnutls_datum_t *raw_cert_list;
 	gnutls_x509_crt_t *certs = NULL;
 	gboolean result = TRUE;
 
-	*list_len = -1;
+	*list_len = 0;
 	if (!session)
 		return NULL;
 
 	raw_cert_list = gnutls_certificate_get_peers(session, list_len);
 
-	if (raw_cert_list && gnutls_certificate_type_get(session) == GNUTLS_CRT_X509) {
+	if (raw_cert_list && (*list_len>0) && gnutls_certificate_type_get(session) == GNUTLS_CRT_X509) {
 		int i = 0;
 
 		if (*list_len > 128)

-----------------------------------------------------------------------


hooks/post-receive
-- 
Claws Mail


More information about the Commits mailing list