Dr. Stephen Henson 3d9b105fe0 PR: 2009
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com>
Approved by: steve@openssl.org

Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:32 +00:00
..
2009-06-25 11:29:30 +00:00
2009-08-12 13:19:54 +00:00
2009-07-24 11:52:55 +00:00
2009-08-12 17:30:37 +00:00
2009-08-26 11:51:57 +00:00
2009-06-05 14:59:26 +00:00
2009-06-17 11:37:44 +00:00
2009-04-23 16:32:42 +00:00
2009-04-23 16:32:42 +00:00
2009-07-08 09:19:53 +00:00
2009-01-07 23:44:27 +00:00
2009-04-04 19:54:06 +00:00
2009-01-07 23:44:27 +00:00
2009-09-02 12:53:52 +00:00
2009-04-20 11:33:12 +00:00
2009-05-28 18:11:29 +00:00
2009-07-14 15:30:05 +00:00
2009-06-26 15:03:35 +00:00
2009-08-05 15:29:58 +00:00
2002-07-10 07:01:54 +00:00
2008-06-03 02:48:34 +00:00
2001-11-10 01:16:28 +00:00
2009-09-02 13:20:32 +00:00
2009-06-30 11:42:04 +00:00
2009-04-07 12:11:21 +00:00
2009-08-26 11:51:57 +00:00
2009-06-30 11:58:10 +00:00
2009-08-12 13:19:54 +00:00
2009-04-20 11:33:12 +00:00
2008-04-29 16:39:03 +00:00
2009-06-30 22:27:33 +00:00
2009-08-26 11:51:57 +00:00
2009-01-07 23:44:27 +00:00
2009-04-20 11:33:12 +00:00
2009-04-28 22:10:54 +00:00
2009-06-30 18:27:03 +00:00