diff options
author | Viktor Dukhovni <viktor@openssl.org> | 2024-06-19 11:04:11 +0000 |
---|---|---|
committer | Gordon Tetlow <gordon@FreeBSD.org> | 2024-09-01 22:50:31 +0000 |
commit | e60dbfd00b009d424dfc5446d132872c93dd0aed (patch) | |
tree | e828b2fb93f9b37f4b07d5ddf95650370e6ccf65 /clang/lib/Parse/ParseDecl.cpp | |
parent | 1070e7dca8223387baf5155524b28f62bfe7da3c (diff) |
Avoid type errors in EAI-related name check logic.
The incorrectly typed data is read only, used in a compare operation, so
neither remote code execution, nor memory content disclosure were possible.
However, applications performing certificate name checks were vulnerable to
denial of service.
The GENERAL_TYPE data type is a union, and we must take care to access the
correct member, based on `gen->type`, not all the member fields have the same
structure, and a segfault is possible if the wrong member field is read.
The code in question was lightly refactored with the intent to make it more
obviously correct.
CVE-2024-6119
(cherry picked from commit 1486960d6cdb052e4fc0109a56a0597b4e902ba1)
Diffstat (limited to 'clang/lib/Parse/ParseDecl.cpp')
0 files changed, 0 insertions, 0 deletions