diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2015-03-09 23:11:45 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-03-19 13:01:13 +0000 |
commit | e677e8d13595f7b3287f8feef7676feb301b0e8a (patch) | |
tree | cf546976642b6a393c9d4be420458da78859dc7d /crypto/asn1 | |
parent | d3cc5e610d1719a35cda52c9152134b490a8c944 (diff) |
Fix ASN1_TYPE_cmp
Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
can be triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.
CVE-2015-0286
Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'crypto/asn1')
-rw-r--r-- | crypto/asn1/a_type.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/crypto/asn1/a_type.c b/crypto/asn1/a_type.c index 13ecfcd9b9..e7ec49d39a 100644 --- a/crypto/asn1/a_type.c +++ b/crypto/asn1/a_type.c @@ -115,6 +115,9 @@ int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b) case V_ASN1_OBJECT: result = OBJ_cmp(a->value.object, b->value.object); break; + case V_ASN1_BOOLEAN: + result = a->value.boolean - b->value.boolean; + break; case V_ASN1_NULL: result = 0; /* They do not have content. */ break; |