Matt Caswell e83ee04bb7 Fix Seg fault in DTLSv1_listen
The DTLSv1_listen function is intended to be stateless and processes
the initial ClientHello from many peers. It is common for user code to
loop over the call to DTLSv1_listen until a valid ClientHello is received
with an associated cookie. A defect in the implementation of DTLSv1_listen
means that state is preserved in the SSL object from one invokation to the
next that can lead to a segmentation fault. Erorrs processing the initial
ClientHello can trigger this scenario. An example of such an error could
be that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only
server.

CVE-2015-0207

Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-03-19 11:11:02 +00:00
..
2015-02-06 10:52:12 -05:00
2015-03-09 10:51:57 +00:00
2015-02-06 10:52:12 -05:00
2015-03-19 11:11:02 +00:00
2015-02-06 10:52:12 -05:00
2015-02-26 23:27:09 +00:00
2015-02-27 20:29:03 +00:00
2012-07-05 13:20:19 +00:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-12 10:28:05 -05:00
2015-01-27 12:34:45 -05:00
2015-03-11 10:40:44 +00:00
2015-03-15 12:15:08 +01:00
2015-03-19 11:11:02 +00:00
2015-02-06 10:52:12 -05:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-01-30 14:43:57 +01:00
2015-03-17 13:39:53 +00:00
2015-01-28 15:37:16 -05:00
2015-03-12 09:25:32 +00:00
2015-02-06 10:52:12 -05:00