Skip to content

Fix buffer overflow in DTLS cookie generation callback#1479

Merged
reaperhulk merged 1 commit intopyca:mainfrom
alex:fix-dtls-cookie-buffer-overflow
Feb 18, 2026
Merged

Fix buffer overflow in DTLS cookie generation callback#1479
reaperhulk merged 1 commit intopyca:mainfrom
alex:fix-dtls-cookie-buffer-overflow

Conversation

@alex
Copy link
Copy Markdown
Member

@alex alex commented Feb 18, 2026

The cookie generate callback copied user-returned bytes into a fixed-size native buffer without enforcing a maximum length. A callback returning more than DTLS1_COOKIE_LENGTH bytes would overflow the OpenSSL-provided buffer, corrupting adjacent memory.

The cookie generate callback copied user-returned bytes into a
fixed-size native buffer without enforcing a maximum length. A
callback returning more than DTLS1_COOKIE_LENGTH bytes would overflow
the OpenSSL-provided buffer, corrupting adjacent memory.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@alex alex force-pushed the fix-dtls-cookie-buffer-overflow branch from fee6c2d to 3b288fb Compare February 18, 2026 12:24
@reaperhulk reaperhulk merged commit 57f09bb into pyca:main Feb 18, 2026
40 checks passed
@alex alex deleted the fix-dtls-cookie-buffer-overflow branch February 18, 2026 12:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants