This fixes the folowing security problems: CVE-2016-9586: printf floating point buffer overflow CVE-2016-9952: Win CE schannel cert wildcard matches too much CVE-2016-9953: Win CE schannel cert name out of buffer read CVE-2016-9594: unititialized random Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
		
			
				
	
	
		
			23 lines
		
	
	
		
			863 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			23 lines
		
	
	
		
			863 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
--- a/lib/vtls/polarssl.c
 | 
						|
+++ b/lib/vtls/polarssl.c
 | 
						|
@@ -657,7 +657,7 @@ void Curl_polarssl_session_free(void *pt
 | 
						|
 
 | 
						|
 size_t Curl_polarssl_version(char *buffer, size_t size)
 | 
						|
 {
 | 
						|
-  unsigned int version = version_get_number();
 | 
						|
+  unsigned int version = POLARSSL_VERSION_NUMBER;
 | 
						|
   return snprintf(buffer, size, "%s/%d.%d.%d",
 | 
						|
                   version >= 0x01030A00?"mbedTLS":"PolarSSL",
 | 
						|
                   version>>24, (version>>16)&0xff, (version>>8)&0xff);
 | 
						|
--- a/lib/vtls/mbedtls.c
 | 
						|
+++ b/lib/vtls/mbedtls.c
 | 
						|
@@ -724,7 +724,7 @@ void Curl_mbedtls_session_free(void *ptr
 | 
						|
 
 | 
						|
 size_t Curl_mbedtls_version(char *buffer, size_t size)
 | 
						|
 {
 | 
						|
-  unsigned int version = mbedtls_version_get_number();
 | 
						|
+  unsigned int version = MBEDTLS_VERSION_NUMBER;
 | 
						|
   return snprintf(buffer, size, "mbedTLS/%d.%d.%d", version>>24,
 | 
						|
                   (version>>16)&0xff, (version>>8)&0xff);
 | 
						|
 }
 |