On Thu, Apr 09, 2026 at 06:21:37AM +0200, Theo Buehler wrote:
> On Wed, Apr 08, 2026 at 10:58:13PM -0400, Daniel Anderson wrote:
> > BUG REPORT: Wrong pointer in as_check_overlap() — TAL constraints bypass
> 
> [...]
> 
> > Change `ases->` to `as->` on lines 75 and 76 of as.c:
> 
> Thanks for the diff which is ok tb.

Also OK claudio@
 
> --- a/usr.sbin/rpki-client/as.c
> +++ b/usr.sbin/rpki-client/as.c
> @@ -72,8 +72,8 @@ as_check_overlap(const struct cert_as *as, const char *fn,
>                               if (as->id != ases[i].id)
>                                       continue;
>                               break;
>                       case CERT_AS_RANGE:
> -                             if (ases->range.min > ases[i].id ||
> -                                 ases->range.max < ases[i].id)
> +                             if (as->range.min > ases[i].id ||
> +                                 as->range.max < ases[i].id)
>                                       continue;
>                               break;
> 

-- 
:wq Claudio

Reply via email to