diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2015-03-09 23:11:45 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-03-19 13:00:44 +0000 |
commit | 497d0b00dca876beb6c81f2ea6d7160897434c2e (patch) | |
tree | 9ccaf3ece8df40192680832188f9075362e87750 | |
parent | 674341f1b0548e36a6cc49917334f5cbd09aaa2c (diff) |
Fix ASN1_TYPE_cmp
Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
can be triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.
CVE-2015-0286
Reviewed-by: Richard Levitte <levitte@openssl.org>
-rw-r--r-- | crypto/asn1/a_type.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/crypto/asn1/a_type.c b/crypto/asn1/a_type.c index 00367ad9a0..69a5cf6f41 100644 --- a/crypto/asn1/a_type.c +++ b/crypto/asn1/a_type.c @@ -116,6 +116,9 @@ int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b) case V_ASN1_OBJECT: result = OBJ_cmp(a->value.object, b->value.object); break; + case V_ASN1_BOOLEAN: + result = a->value.boolean - b->value.boolean; + break; case V_ASN1_NULL: result = 0; /* They do not have content. */ break; |