Adam Langley d0a4b7d1a2 Fix memory leak from zero-length DTLS fragments.
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.

This allows an attacker to exhaust the memory of a DTLS peer.

Fixes CVE-2014-3507

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Emilia Käsper <emilia@openssl.org>
2014-08-06 20:36:40 +01:00
..
2012-04-16 17:42:36 +00:00
2013-11-01 21:41:52 +00:00
2013-04-09 14:02:48 +01:00
2013-04-09 14:02:48 +01:00
2012-07-05 13:20:19 +00:00
2009-04-23 16:32:42 +00:00
2014-02-26 15:33:11 +00:00
2014-03-28 14:56:30 +00:00
2014-06-09 12:09:52 +01:00
2013-02-06 14:16:55 +00:00
2014-03-28 14:56:30 +00:00
2014-03-28 14:56:30 +00:00
2014-07-04 13:26:35 +01:00
2014-07-05 23:56:54 +02:00
2014-07-04 13:26:35 +01:00
2002-07-10 07:01:54 +00:00
2014-03-28 14:56:30 +00:00
2011-11-21 22:52:13 +00:00
2014-07-04 13:26:35 +01:00
2013-05-13 22:49:58 +02:00
2014-07-05 15:00:53 +01:00
2014-07-04 13:26:35 +01:00
2014-03-28 14:56:30 +00:00
2014-07-04 13:26:35 +01:00
2012-07-05 13:20:02 +00:00
2014-07-24 19:41:29 +01:00
2014-07-04 13:26:35 +01:00
2014-07-02 00:11:10 +01:00
2009-12-27 22:58:55 +00:00
2014-07-04 13:26:35 +01:00
2011-12-14 22:17:06 +00:00