1436e15488
This fixes the folowing security problems: CVE-2016-9586: printf floating point buffer overflow CVE-2016-9952: Win CE schannel cert wildcard matches too much CVE-2016-9953: Win CE schannel cert name out of buffer read CVE-2016-9594: unititialized random Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
22 lines
863 B
Diff
22 lines
863 B
Diff
--- a/lib/vtls/polarssl.c
|
|
+++ b/lib/vtls/polarssl.c
|
|
@@ -657,7 +657,7 @@ void Curl_polarssl_session_free(void *pt
|
|
|
|
size_t Curl_polarssl_version(char *buffer, size_t size)
|
|
{
|
|
- unsigned int version = version_get_number();
|
|
+ unsigned int version = POLARSSL_VERSION_NUMBER;
|
|
return snprintf(buffer, size, "%s/%d.%d.%d",
|
|
version >= 0x01030A00?"mbedTLS":"PolarSSL",
|
|
version>>24, (version>>16)&0xff, (version>>8)&0xff);
|
|
--- a/lib/vtls/mbedtls.c
|
|
+++ b/lib/vtls/mbedtls.c
|
|
@@ -724,7 +724,7 @@ void Curl_mbedtls_session_free(void *ptr
|
|
|
|
size_t Curl_mbedtls_version(char *buffer, size_t size)
|
|
{
|
|
- unsigned int version = mbedtls_version_get_number();
|
|
+ unsigned int version = MBEDTLS_VERSION_NUMBER;
|
|
return snprintf(buffer, size, "mbedTLS/%d.%d.%d", version>>24,
|
|
(version>>16)&0xff, (version>>8)&0xff);
|
|
}
|