diff options
author | Andreas Steffen <andreas.steffen@strongswan.org> | 2009-06-19 14:44:11 +0200 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2009-06-19 14:44:11 +0200 |
commit | 1e3bcfeb714d58f15e2779984462d59f062b6bb0 (patch) | |
tree | 8a8c76b0d27ebec5d400cc4bfba11e22fcf97585 /src/libstrongswan/asn1/asn1_parser.c | |
parent | d7d349271697bddbf0566e674b10c30e30bf4c52 (diff) | |
download | strongswan-1e3bcfeb714d58f15e2779984462d59f062b6bb0.tar.bz2 strongswan-1e3bcfeb714d58f15e2779984462d59f062b6bb0.tar.xz |
Fixed two DoS vulnerabilities in the ASN.1 parser, version bump to 4.2.16
Diffstat (limited to 'src/libstrongswan/asn1/asn1_parser.c')
-rw-r--r-- | src/libstrongswan/asn1/asn1_parser.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/libstrongswan/asn1/asn1_parser.c b/src/libstrongswan/asn1/asn1_parser.c index 68c5e7307..a57f9adc6 100644 --- a/src/libstrongswan/asn1/asn1_parser.c +++ b/src/libstrongswan/asn1/asn1_parser.c @@ -160,7 +160,7 @@ static bool iterate(private_asn1_parser_t *this, int *objectID, chunk_t *object) blob1->len = asn1_length(blob); - if (blob1->len == ASN1_INVALID_LENGTH || blob->len < blob1->len) + if (blob1->len == ASN1_INVALID_LENGTH) { DBG1("L%d - %s: length of ASN.1 object invalid or too large", level, obj.name); |