openssl/crypto/ct
Richard Levitte d85d3c993e Fix faulty free
On error, i2o_SCT_signature() and i2o_SCT() free a pointer that may
have wandered off from the start of the allocated block (not currently
true for i2o_SCT_signature(), but has that potential as the code may
change.  To avoid this, save away the start of the allocated block and
free that instead.

Thanks to Guido Vranken for reporting this issue.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/2323)
2017-01-29 15:31:01 +01:00
..
build.info CT policy validation 2016-03-01 20:03:25 +00:00
ct_b64.c Pass a temporary pointer to o2i_SCT_signature from SCT_new_from_base64 2016-11-16 13:43:36 +00:00
ct_err.c Check that SCT timestamps are not in the future 2016-11-15 16:12:41 -05:00
ct_locl.h Reword documentation for {SCT_CTX/CT_POLICY_EVAL_CTX}_set_time 2016-11-15 16:12:41 -05:00
ct_log.c Prevent double-free of CTLOG public key 2016-08-23 20:17:14 +01:00
ct_oct.c Fix faulty free 2017-01-29 15:31:01 +01:00
ct_policy.c Convert C++ comments to C-style comments 2016-11-15 16:12:41 -05:00
ct_prn.c Add ASN1_STRING_get0_data(), deprecate ASN1_STRING_data(). 2016-08-16 16:05:35 +01:00
ct_sct.c Move SCT_LIST_free definition into a more logical place 2016-11-16 13:54:17 +00:00
ct_sct_ctx.c Check that SCT timestamps are not in the future 2016-11-15 16:12:41 -05:00
ct_vfy.c Check that SCT timestamps are not in the future 2016-11-15 16:12:41 -05:00
ct_x509v3.c Specify array sizes 2016-06-11 16:43:49 +02:00