From 663d5c44471383cd3a2c98acaea8b7e40254f536 Mon Sep 17 00:00:00 2001 From: "Danilo G. Baio" Date: Fri, 23 Feb 2018 20:35:13 +0000 Subject: www/squid: Fixes security vulnerabilities Add patches to fix CVE's: CVE-2018-1000024 CVE-2018-1000027 PR: 226139 Submitted by: Yasuhiro KIMURA Approved by: timp87@gmail.com (maintainer) MFH: 2018Q1 Security: d5b6d151-1887-11e8-94f7-9c5c8e75236a --- www/squid/files/patch-src_esi_CustomParser.cc | 28 +++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 www/squid/files/patch-src_esi_CustomParser.cc (limited to 'www/squid/files/patch-src_esi_CustomParser.cc') diff --git a/www/squid/files/patch-src_esi_CustomParser.cc b/www/squid/files/patch-src_esi_CustomParser.cc new file mode 100644 index 000000000000..8c9287c64ecd --- /dev/null +++ b/www/squid/files/patch-src_esi_CustomParser.cc @@ -0,0 +1,28 @@ +http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_1.patch + +commit eb2db98a676321b814fc4a51c4fb7928a8bb45d9 (refs/remotes/origin/v3.5) +Author: Amos Jeffries +Date: 2018-01-19 13:54:14 +1300 + + ESI: make sure endofName never exceeds tagEnd (#130) + +--- src/esi/CustomParser.cc.orig 2018-02-23 13:37:52 UTC ++++ src/esi/CustomParser.cc +@@ -121,7 +121,7 @@ ESICustomParser::parse(char const *dataToParse, size_t + + char * endofName = strpbrk(const_cast(tag), w_space); + +- if (endofName > tagEnd) ++ if (!endofName || endofName > tagEnd) + endofName = const_cast(tagEnd); + + *endofName = '\0'; +@@ -214,7 +214,7 @@ ESICustomParser::parse(char const *dataToParse, size_t + + char * endofName = strpbrk(const_cast(tag), w_space); + +- if (endofName > tagEnd) ++ if (!endofName || endofName > tagEnd) + endofName = const_cast(tagEnd); + + *endofName = '\0'; -- cgit v1.2.3