Dr. Stephen Henson 54ed003ace PR: 2009
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com>
Approved by: steve@openssl.org

Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:22 +00:00
..
2009-06-25 11:26:45 +00:00
2009-08-12 13:21:26 +00:00
2009-07-24 11:52:32 +00:00
2009-08-26 11:51:23 +00:00
2009-06-05 14:46:49 +00:00
2009-04-21 22:20:12 +00:00
2009-04-22 15:40:54 +00:00
2009-06-14 02:37:22 +00:00
2009-01-07 23:44:27 +00:00
2009-01-07 23:44:27 +00:00
2009-09-02 12:53:32 +00:00
2009-06-16 16:39:20 +00:00
2009-04-16 17:22:51 +00:00
2009-06-26 15:04:22 +00:00
2009-08-05 15:29:14 +00:00
2002-07-10 07:01:54 +00:00
2008-06-03 02:48:34 +00:00
2001-11-10 01:16:28 +00:00
2009-06-16 16:39:20 +00:00
2009-09-02 13:20:22 +00:00
2009-04-07 12:10:59 +00:00
2009-08-26 11:51:23 +00:00
2009-08-12 13:21:26 +00:00
2009-04-19 18:03:13 +00:00
2008-04-29 16:39:03 +00:00
2009-06-30 22:26:28 +00:00
2009-08-26 11:51:23 +00:00
2009-01-07 23:44:27 +00:00
2009-04-19 18:03:13 +00:00
2009-04-28 22:01:53 +00:00
2009-06-30 20:55:55 +00:00