Hi Peter,

Can you resend this as a proper patch ready to be applied ?
Or as a PR on Github if this is easier for you ?

Le jeu. 3 nov. 2022 à 10:26, Peter Naulls <pe...@chocky.org> a écrit :
>
>
> https://nvd.nist.gov/vuln/detail/CVE-2021-46848
>
> Against openwrt-22.03
>
> --- /dev/null
> +++ b/libs/libtasn1/patches/099-CVE-2020-15888.patch

CVE link and patch name do not match

> @@ -0,0 +1,11 @@
> +--- a/lib/int.h        2022-11-03 10:15:01.065656767 -0400
> ++++ b/lib/int.h        2022-11-03 10:15:39.333658083 -0400
> +@@ -97,7 +97,7 @@
> + #define ETYPE_TAG(etype) (_asn1_tags[etype].tag)
> + #define ETYPE_CLASS(etype) (_asn1_tags[etype].class)
> + #define ETYPE_OK(etype) (((etype) != ASN1_ETYPE_INVALID && \
> +-                          (etype) <= _asn1_tags_size && \
> ++                          (etype) < _asn1_tags_size && \
> +                           _asn1_tags[(etype)].desc != NULL)?1:0)
> +
> + #define ETYPE_IS_STRING(etype) ((etype == ASN1_ETYPE_GENERALSTRING || \

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to