• D
    PR: 2009 · 3d9b105f
    Dr. Stephen Henson 提交于
    Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com>
    Approved by: steve@openssl.org
    
    Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
    the ticket mentions buffer overruns this isn't a security issue because
    the SSL_SESSION structure is generated internally and it should never be
    possible to supply its contents from an untrusted application (this would
    among other things destroy session cache security).
    3d9b105f
ssl_asn1.c 19.0 KB