David Benjamin 7a433893ad Fix memory leak on invalid CertificateRequest.
Free up parsed X509_NAME structure if the CertificateRequest message
contains excess data.

The security impact is considered insignificant. This is a client side
only leak and a large number of connections to malicious servers would
be needed to have a significant impact.

This was found by libFuzzer.

Reviewed-by: Emilia Käsper <emilia@openssl.org>
Reviewed-by: Stephen Henson <steve@openssl.org>
(cherry picked from commit ec66c8c98881186abbb4a7ddd6617970f1ee27a7)
2016-04-07 19:27:45 +01:00
..
2015-09-20 14:22:52 +01:00
2016-03-18 11:59:11 +00:00
2015-06-02 09:12:39 +01:00
2015-05-22 10:24:49 +01:00
2015-02-27 20:32:49 +00:00
2016-03-01 13:40:45 +00:00
2016-03-07 18:57:40 +01:00
2016-03-14 21:17:18 +01:00
2016-03-07 18:57:40 +01:00
2015-09-02 00:31:33 +01:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-07-27 16:14:02 +01:00
2015-01-22 09:38:39 +00:00
2015-11-24 21:53:40 +01:00
2016-03-07 18:57:40 +01:00
2016-03-07 18:57:40 +01:00
2015-05-05 20:07:48 +01:00
2016-03-14 21:17:18 +01:00
2015-12-19 20:40:39 +00:00
2016-03-18 11:59:11 +00:00
2015-10-23 20:43:09 +02:00
2015-04-16 13:51:51 -04:00