Fix a DTLS memory leak
Fixes #7428
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/7431)
(cherry picked from commit 01666a8c1d
)
This commit is contained in:
parent
a66c361a77
commit
a6a83827a0
1 changed files with 3 additions and 1 deletions
|
@ -1519,10 +1519,12 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
|
||||||
* So check cookie length...
|
* So check cookie length...
|
||||||
*/
|
*/
|
||||||
if (SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE) {
|
if (SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE) {
|
||||||
if (clienthello->dtls_cookie_len == 0)
|
if (clienthello->dtls_cookie_len == 0) {
|
||||||
|
OPENSSL_free(clienthello);
|
||||||
return MSG_PROCESS_FINISHED_READING;
|
return MSG_PROCESS_FINISHED_READING;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
|
if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
|
||||||
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PROCESS_CLIENT_HELLO,
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PROCESS_CLIENT_HELLO,
|
||||||
|
|
Loading…
Reference in a new issue