Fix crash in dtls1_get_record whilst in the listen state where you get two
separate reads performed - one for the header and one for the body of the handshake record. CVE-2014-3571 Reviewed-by: Matt Caswell <matt@openssl.org>
This commit is contained in:
parent
eb37b6aa41
commit
bf6fa208b5
2 changed files with 2 additions and 2 deletions
|
@ -634,8 +634,6 @@ again:
|
||||||
/* now s->packet_length == DTLS1_RT_HEADER_LENGTH */
|
/* now s->packet_length == DTLS1_RT_HEADER_LENGTH */
|
||||||
i=rr->length;
|
i=rr->length;
|
||||||
n=ssl3_read_n(s,i,i,1);
|
n=ssl3_read_n(s,i,i,1);
|
||||||
if (n <= 0) return(n); /* error or non-blocking io */
|
|
||||||
|
|
||||||
/* this packet contained a partial record, dump it */
|
/* this packet contained a partial record, dump it */
|
||||||
if ( n != i)
|
if ( n != i)
|
||||||
{
|
{
|
||||||
|
|
|
@ -182,6 +182,8 @@ int ssl3_read_n(SSL *s, int n, int max, int extend)
|
||||||
* at once (as long as it fits into the buffer). */
|
* at once (as long as it fits into the buffer). */
|
||||||
if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER)
|
if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER)
|
||||||
{
|
{
|
||||||
|
if (left == 0 && extend)
|
||||||
|
return 0;
|
||||||
if (left > 0 && n > left)
|
if (left > 0 && n > left)
|
||||||
n = left;
|
n = left;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue