Fix memory leak on invalid CertificateRequest.
authorDavid Benjamin <davidben@google.com>
Mon, 14 Mar 2016 19:03:07 +0000 (15:03 -0400)
committerDr. Stephen Henson <steve@openssl.org>
Thu, 7 Apr 2016 18:25:48 +0000 (19:25 +0100)
commitec66c8c98881186abbb4a7ddd6617970f1ee27a7
tree55c81cb1f081cde910d3ee582cf250643fc32144
parentaf2db04c9979554ada88d969da6332a827a47599
Fix memory leak on invalid CertificateRequest.

Free up parsed X509_NAME structure if the CertificateRequest message
contains excess data.

The security impact is considered insignificant. This is a client side
only leak and a large number of connections to malicious servers would
be needed to have a significant impact.

This was found by libFuzzer.

Reviewed-by: Emilia Käsper <emilia@openssl.org>
Reviewed-by: Stephen Henson <steve@openssl.org>
ssl/s3_clnt.c