1. 22 Jan, 2015 20 commits
  2. 14 Jan, 2015 1 commit
  3. 13 Jan, 2015 7 commits
  4. 12 Jan, 2015 7 commits
  5. 10 Jan, 2015 1 commit
  6. 09 Jan, 2015 2 commits
  7. 08 Jan, 2015 2 commits
    • Matt Caswell's avatar
    • Matt Caswell's avatar
      A memory leak can occur in dtls1_buffer_record if either of the calls to · 103b171d
      Matt Caswell authored
      
      ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
      malloc failure, whilst the latter will fail if attempting to add a duplicate
      record to the queue. This should never happen because duplicate records should
      be detected and dropped before any attempt to add them to the queue.
      Unfortunately records that arrive that are for the next epoch are not being
      recorded correctly, and therefore replays are not being detected.
      Additionally, these "should not happen" failures that can occur in
      dtls1_buffer_record are not being treated as fatal and therefore an attacker
      could exploit this by sending repeated replay records for the next epoch,
      eventually causing a DoS through memory exhaustion.
      
      Thanks to Chris Mueller for reporting this issue and providing initial
      analysis and a patch. Further analysis and the final patch was performed by
      Matt Caswell from the OpenSSL development team.
      
      CVE-2015-0206
      
      Reviewed-by: default avatarDr Stephen Henson <steve@openssl.org>
      103b171d