4e07167eff
This fixes the following security problems: CVE-2016-8615: cookie injection for other servers CVE-2016-8616: case insensitive password comparison CVE-2016-8617: OOB write via unchecked multiplication CVE-2016-8618: double-free in curl_maprintf CVE-2016-8619: double-free in krb5 code CVE-2016-8620: glob parser write/read out of bounds CVE-2016-8621: curl_getdate read out of bounds CVE-2016-8622: URL unescape heap overflow via integer truncation CVE-2016-8623: Use-after-free via shared cookies CVE-2016-8624: invalid URL parsing with '#' CVE-2016-8625: IDNA 2003 makes curl use wrong host Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
22 lines
863 B
Diff
22 lines
863 B
Diff
--- a/lib/vtls/polarssl.c
|
|
+++ b/lib/vtls/polarssl.c
|
|
@@ -646,7 +646,7 @@ void Curl_polarssl_session_free(void *pt
|
|
|
|
size_t Curl_polarssl_version(char *buffer, size_t size)
|
|
{
|
|
- unsigned int version = version_get_number();
|
|
+ unsigned int version = POLARSSL_VERSION_NUMBER;
|
|
return snprintf(buffer, size, "%s/%d.%d.%d",
|
|
version >= 0x01030A00?"mbedTLS":"PolarSSL",
|
|
version>>24, (version>>16)&0xff, (version>>8)&0xff);
|
|
--- a/lib/vtls/mbedtls.c
|
|
+++ b/lib/vtls/mbedtls.c
|
|
@@ -712,7 +712,7 @@ void Curl_mbedtls_session_free(void *ptr
|
|
|
|
size_t Curl_mbedtls_version(char *buffer, size_t size)
|
|
{
|
|
- unsigned int version = mbedtls_version_get_number();
|
|
+ unsigned int version = MBEDTLS_VERSION_NUMBER;
|
|
return snprintf(buffer, size, "mbedTLS/%d.%d.%d", version>>24,
|
|
(version>>16)&0xff, (version>>8)&0xff);
|
|
}
|