Fri, 16 Jan 2015 18:43:36 +0100 от Kurt Roeckx <k...@roeckx.be>:
> 
> There is an upstream bug report about the patch for CVE-2015-0206
> breaking it.  Are you sure it's the right patch?

That's the patch removing which fixed the problem for me. I tried removing the 
patch for CVE-2015-0206 
(0112-A-memory-leak-can-occur-in-dtls1_buffer_record-if-ei.patch) and keeping 
others but it didn't help - the problem is still present. I didn't try every 
patch added in u14 indivilually though.

> The fix for that issue was to use SSL_CTX_set_read_ahead() setting
> it to 1.  Can you check that fixes it for you?

That worked, thanks. Adding that function call fixes DTLS handshake with the 
stock 1.0.1e-2+deb7u14 package.

So, should this be considered a bug in libwebrtc or is this an unintended 
breaking change in openssl?

Reply via email to