• M
    Fix ssl_get_prev_session overrun · 5e0a80c1
    Matt Caswell 提交于
    If OpenSSL is configured with no-tlsext then ssl_get_prev_session can read
    past the end of the ClientHello message if the session_id length in the
    ClientHello is invalid. This should not cause any security issues since the
    underlying buffer is 16k in size. It should never be possible to overrun by
    that many bytes.
    
    This is probably made redundant by the previous commit - but you can never be
    too careful.
    
    With thanks to Qinghao Tang for reporting this issue.
    Reviewed-by: NRich Salz <rsalz@openssl.org>
    5e0a80c1
ssl_sess.c 38.3 KB