Plug two mbuf leaks during INIT-ACK handling.
One leak happens when there is not enough memory to allocate the
the resources for streams. The other leak happens if the are
unknown parameters in the received INIT-ACK chunk which require
reporting and the INIT-ACK requires sending an ABORT due to illegal
parameter combinations.
Hopefully this fixes
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19083
1 file changed
tree: 04b823158789e3e8cb685aac1d11cd543064503f
  1. fuzzer/
  2. programs/
  3. usrsctplib/
  4. .gitignore
  5. bootstrap
  6. CMakeLists.txt
  7. configure.ac
  8. gen-def.py
  9. LICENSE.md
  10. Makefile.am
  11. Makefile.nmake
  12. Manual.md
  13. Manual.tex
  14. meson.build
  15. meson_options.txt
  16. README.md
  17. usrsctp.pc.in
README.md

usrsctp

Coverity Scan Build Status

This is a userland SCTP stack supporting FreeBSD, Linux, Mac OS X and Windows.

See manual for more information.

The status of continuous integration testing is available from our Buildbot.