On Wed, Apr 08, 2026 at 10:58:13PM -0400, Daniel Anderson wrote:
> BUG REPORT: Wrong pointer in as_check_overlap() — TAL constraints bypass
[...]
> Change `ases->` to `as->` on lines 75 and 76 of as.c:
Thanks for the diff which is ok tb.
--- a/usr.sbin/rpki-client/as.c
+++ b/usr.sbin/rpki-client/as.c
@@ -72,8 +72,8 @@ as_check_overlap(const struct cert_as *as, const char *fn,
if (as->id != ases[i].id)
continue;
break;
case CERT_AS_RANGE:
- if (ases->range.min > ases[i].id ||
- ases->range.max < ases[i].id)
+ if (as->range.min > ases[i].id ||
+ as->range.max < ases[i].id)
continue;
break;