mirror of
https://github.com/openssl/openssl.git
synced 2025-03-07 19:38:33 +08:00
The DTLSv1_listen function is intended to be stateless and processes the initial ClientHello from many peers. It is common for user code to loop over the call to DTLSv1_listen until a valid ClientHello is received with an associated cookie. A defect in the implementation of DTLSv1_listen means that state is preserved in the SSL object from one invokation to the next that can lead to a segmentation fault. Erorrs processing the initial ClientHello can trigger this scenario. An example of such an error could be that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only server. CVE-2015-0207 Reviewed-by: Richard Levitte <levitte@openssl.org> |
||
---|---|---|
.. | ||
bio_ssl.c | ||
d1_both.c | ||
d1_clnt.c | ||
d1_lib.c | ||
d1_meth.c | ||
d1_pkt.c | ||
d1_srtp.c | ||
d1_srvr.c | ||
dtls1.h | ||
heartbeat_test.c | ||
install-ssl.com | ||
kssl_lcl.h | ||
kssl.c | ||
kssl.h | ||
Makefile | ||
s3_both.c | ||
s3_cbc.c | ||
s3_clnt.c | ||
s3_enc.c | ||
s3_lib.c | ||
s3_meth.c | ||
s3_pkt.c | ||
s3_srvr.c | ||
s23_clnt.c | ||
s23_lib.c | ||
s23_meth.c | ||
s23_pkt.c | ||
s23_srvr.c | ||
srtp.h | ||
ssl2.h | ||
ssl3.h | ||
ssl23.h | ||
ssl_algs.c | ||
ssl_asn1.c | ||
ssl_cert.c | ||
ssl_ciph.c | ||
ssl_conf.c | ||
ssl_err2.c | ||
ssl_err.c | ||
ssl_lib.c | ||
ssl_locl.h | ||
ssl_rsa.c | ||
ssl_sess.c | ||
ssl_stat.c | ||
ssl_task.c | ||
ssl_txt.c | ||
ssl_utst.c | ||
ssl-lib.com | ||
ssl.h | ||
ssltest.c | ||
t1_clnt.c | ||
t1_enc.c | ||
t1_ext.c | ||
t1_lib.c | ||
t1_meth.c | ||
t1_reneg.c | ||
t1_srvr.c | ||
t1_trce.c | ||
tls1.h | ||
tls_srp.c |