Adam Majer
50777186fb
- Fix validation of Digest auth header parameters - changes since squid-6.11: - Fix Kerberos detection when cross-compiling - Improve robustness of DNS code on reconfigure - Prevent slow memory leak in TCP DNS queries - Improve errors emitted when invalid ACLs are parsed - Disble ESI. The code is removed upstream in 7.x (bsc#1232485, CVE-2024-45802) OBS-URL: https://build.opensuse.org/package/show/server:proxy/squid?expand=0&rev=301
14 lines
596 B
Diff
14 lines
596 B
Diff
Index: squid-6.9/src/ConfigParser.cc
|
|
===================================================================
|
|
--- squid-6.9.orig/src/ConfigParser.cc
|
|
+++ squid-6.9/src/ConfigParser.cc
|
|
@@ -181,7 +181,7 @@ ConfigParser::UnQuote(const char *token,
|
|
*d = '\0';
|
|
|
|
// We are expecting a separator after quoted string, space or one of "()#"
|
|
- if (*(s + 1) != '\0' && !strchr(w_space "()#", *(s + 1)) && !errorStr) {
|
|
+ if (!errorStr && *(s + 1) != '\0' && !strchr(w_space "()#", *(s + 1))) {
|
|
errorStr = "Expecting space after the end of quoted token";
|
|
errorPos = token;
|
|
}
|