Skip to content
Commit 0ae3473e authored by Matt Caswell's avatar Matt Caswell
Browse files

Fix race condition in NewSessionTicket

If a NewSessionTicket is received by a multi-threaded client when
attempting to reuse a previous ticket then a race condition can occur
potentially leading to a double free of the ticket data.

CVE-2015-1791

This also fixes RT#3808 where a session ID is changed for a session already
in the client session cache. Since the session ID is the key to the cache
this breaks the cache access.

Parts of this patch were inspired by this Akamai change:
https://github.com/akamai/openssl/commit/c0bf69a791239ceec64509f9f19fcafb2461b0d3



Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
(cherry picked from commit 27c76b9b)

Conflicts:
	ssl/ssl.h
	ssl/ssl_err.c
parent 98377858
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment