squid/CVE-2024-33427.patch
Adam Majer 50777186fb - Update to 6.12
- Fix validation of Digest auth header parameters
- changes since squid-6.11:
  - Fix Kerberos detection when cross-compiling
  - Improve robustness of DNS code on reconfigure
  - Prevent slow memory leak in TCP DNS queries
  - Improve errors emitted when invalid ACLs are parsed

- Disble ESI. The code is removed upstream in 7.x (bsc#1232485, CVE-2024-45802)

OBS-URL: https://build.opensuse.org/package/show/server:proxy/squid?expand=0&rev=301
2024-12-09 13:10:14 +00:00

14 lines
596 B
Diff

Index: squid-6.9/src/ConfigParser.cc
===================================================================
--- squid-6.9.orig/src/ConfigParser.cc
+++ squid-6.9/src/ConfigParser.cc
@@ -181,7 +181,7 @@ ConfigParser::UnQuote(const char *token,
*d = '\0';
// We are expecting a separator after quoted string, space or one of "()#"
- if (*(s + 1) != '\0' && !strchr(w_space "()#", *(s + 1)) && !errorStr) {
+ if (!errorStr && *(s + 1) != '\0' && !strchr(w_space "()#", *(s + 1))) {
errorStr = "Expecting space after the end of quoted token";
errorPos = token;
}