Matt Caswell cce3e4adb7 Clear state in DTLSv1_listen
This is a backport of commit e83ee04bb7de800cdb71d522fa562e99328003a3 from
the master branch (and this has also been applied to 1.0.2). In 1.0.2 this
was CVE-2015-0207. For other branches there is no known security issue, but
this is being backported as a precautionary measure.

The DTLSv1_listen function is intended to be stateless and processes
the initial ClientHello from many peers. It is common for user code to
loop over the call to DTLSv1_listen until a valid ClientHello is received
with an associated cookie. A defect in the implementation of DTLSv1_listen
means that state is preserved in the SSL object from one invokation to the
next.

Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-06-02 09:12:39 +01:00
..
2015-06-02 09:12:39 +01:00
2015-05-22 10:24:49 +01:00
2015-02-27 20:32:49 +00:00
2015-01-22 09:38:39 +00:00
2015-03-11 10:49:22 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-03-08 22:42:23 +00:00
2015-05-05 20:07:48 +01:00
2015-04-30 23:26:06 +01:00
2015-01-22 09:38:39 +00:00
2015-04-16 13:51:51 -04:00