You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
pyOpenSSL DTLS cookie callback buffer overflow
High severity
GitHub Reviewed
Published
Mar 15, 2026
in
pyca/pyopenssl
If a user provided callback to set_cookie_generate_callback returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Learn more on MITRE.
If a user provided callback to
set_cookie_generate_callbackreturned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer.Cookie values that are too long are now rejected.
References