Prevent potential NULL pointer dereference in ssl_read_record()

This commit is contained in:
Paul Bakker 2014-04-08 14:36:50 +02:00
parent 563ad02663
commit 4224bc0a4f
2 changed files with 4 additions and 1 deletions

View file

@ -12,6 +12,8 @@ Security
This affects certificates in the user-supplied chain except the top
certificate. If the user-supplied chain contains only one certificates,
it is not affected (ie, its notAfter date is properly checked).
* Prevent potential NULL pointer dereference in ssl_read_record() (found by
TrustInSoft)
Bugfix
* The length of various ClientKeyExchange messages was not properly checked.

View file

@ -2087,7 +2087,8 @@ int ssl_read_record( ssl_context *ssl )
return( POLARSSL_ERR_SSL_INVALID_RECORD );
}
ssl->handshake->update_checksum( ssl, ssl->in_msg, ssl->in_hslen );
if( ssl->state != SSL_HANDSHAKE_OVER )
ssl->handshake->update_checksum( ssl, ssl->in_msg, ssl->in_hslen );
return( 0 );
}