On Wed, Apr 08, 2026 at 10:58:13PM -0400, Daniel Anderson wrote:
> BUG REPORT: Wrong pointer in as_check_overlap() — TAL constraints bypass

[...]

> Change `ases->` to `as->` on lines 75 and 76 of as.c:

Thanks for the diff which is ok tb.

--- a/usr.sbin/rpki-client/as.c
+++ b/usr.sbin/rpki-client/as.c
@@ -72,8 +72,8 @@ as_check_overlap(const struct cert_as *as, const char *fn,
                                if (as->id != ases[i].id)
                                        continue;
                                break;
                        case CERT_AS_RANGE:
-                               if (ases->range.min > ases[i].id ||
-                                   ases->range.max < ases[i].id)
+                               if (as->range.min > ases[i].id ||
+                                   as->range.max < ases[i].id)
                                        continue;
                                break;

Reply via email to