Dr. Stephen Henson 1da61e8051 PR: 2009
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com>
Approved by: steve@openssl.org

Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:02 +00:00
..
2009-08-13 15:14:32 +00:00
2009-07-24 11:50:51 +00:00
2009-08-26 11:54:14 +00:00
2009-06-05 15:05:10 +00:00
2009-04-16 16:43:18 +00:00
2007-01-21 16:07:25 +00:00
2009-08-06 16:23:17 +00:00
2009-04-19 18:08:12 +00:00
2009-07-13 22:37:45 +00:00
2009-06-26 15:02:01 +00:00
2009-08-06 16:23:17 +00:00
2002-07-10 07:01:54 +00:00
2001-11-10 01:16:28 +00:00
2009-09-02 13:20:02 +00:00
2009-06-30 11:42:50 +00:00
2009-04-07 12:10:12 +00:00
2009-08-26 11:54:14 +00:00
2009-04-19 18:08:12 +00:00
2009-08-13 15:14:32 +00:00
2009-04-19 18:08:12 +00:00
2008-04-29 16:38:26 +00:00
2009-06-30 22:29:24 +00:00
2009-08-26 11:54:14 +00:00
2009-04-19 18:08:12 +00:00
2009-04-28 22:02:16 +00:00
2009-06-30 20:55:19 +00:00