]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
BUG/MINOR: quic: avoid leaking post handshake frames
authorFrederic Lecaille <flecaille@haproxy.com>
Thu, 17 Oct 2024 05:38:14 +0000 (07:38 +0200)
committerFrederic Lecaille <flecaille@haproxy.com>
Thu, 17 Oct 2024 13:04:06 +0000 (15:04 +0200)
This bug came with this commit:
f627b92 BUG/MEDIUM: quic: always validate sender address on 0-RTT
If an error happens in quic_build_post_handshake_frames() during the
code exexuted for th NEW_TOKEN frame allocation, some could leak because
of the wrong label used to interrupt this function asap.
Replace the "goto leave" by "goto err" to deallocated such frames to fix
this issue.

Must be backported as far as 2.9.

src/quic_conn.c

index 9701eaab2e03926b5b78a49eef5035920f9e0866..5adf528b5c8313b3cba920c44f84054589b3a30f 100644 (file)
@@ -462,7 +462,7 @@ int quic_stateless_reset_token_cpy(unsigned char *pos, size_t len,
  */
 int quic_build_post_handshake_frames(struct quic_conn *qc)
 {
-       int ret = 0, max;
+       int ret = 0, max = 0;
        struct quic_enc_level *qel;
        struct quic_frame *frm, *frmbak;
        struct list frm_list = LIST_HEAD_INIT(frm_list);
@@ -488,7 +488,7 @@ int quic_build_post_handshake_frames(struct quic_conn *qc)
                        frm = qc_frm_alloc(QUIC_FT_NEW_TOKEN);
                        if (!frm) {
                                TRACE_ERROR("frame allocation error", QUIC_EV_CONN_IO_CB, qc);
-                               goto leave;
+                               goto err;
                        }
 
                        new_token_frm_len =
@@ -496,7 +496,7 @@ int quic_build_post_handshake_frames(struct quic_conn *qc)
                                                    sizeof(frm->new_token.data), &qc->peer_addr);
                        if (!new_token_frm_len) {
                                TRACE_ERROR("token generation failed", QUIC_EV_CONN_IO_CB, qc);
-                               goto leave;
+                               goto err;
                        }
 
                        BUG_ON(new_token_frm_len != sizeof(frm->new_token.data));