]> git.pld-linux.org Git - packages/apache1-mod_access_referer.git/commitdiff
Based on patch from: STABLE apache-mod_access_referer-1_0_2-6
authorkloczek <kloczek@pld-linux.org>
Wed, 9 Apr 2003 21:03:46 +0000 (21:03 +0000)
committercvs2git <feedback@pld-linux.org>
Sun, 24 Jun 2012 12:13:13 +0000 (12:13 +0000)
http://dl.sourceforge.net/sourceforge/accessreferer/mod_access_referer_1.0.2_third_part_patch.txt
(fixed rejection by s/<spaces>/<tabs>/)
Comment from this file:
mod_access_referer contains a null-pinter dereferences vulnerability that
may possibly be used in denial of service attacks. While the impact of
this vulnerability is considered low-risk, we advise you to apply the
following patch.
Thans to Niels Heinen <zillion@safemode.org> for inform about this fix.

Changed files:
    mod_access_referer_1.0.2_third_part_patch.txt -> 1.2

mod_access_referer_1.0.2_third_part_patch.txt

index 120992365243e50f5e25db1b55f3d32a152385c0..f83c135e090af99ffce41e3a4289afba8fac686a 100644 (file)
@@ -7,15 +7,13 @@ mod_access_referer contains a null-pinter dereferences vulnerability that may po
 --- mod_access_referer.c.org    Wed Apr  9 19:27:00 2003
 +++ mod_access_referer.c        Wed Apr  9 19:36:20 2003
 @@ -492,6 +492,10 @@
-                                                         (r->headers_in,
-                                                          "Referer"),
-                                                         &uptr);
-+                               if(uptr.hostname == NULL) {
-+                                   return 0;
-+                               }
+                                                        (r->headers_in,
+                                                         "Referer"),
+                                                        &uptr);
++                              if(uptr.hostname == NULL) {
++                                      return 0;
++                              }
 +
-                                if (!is_ip (uptr.hostname)) {
-                                        /* XX resolv the domain name */
-                                        got_refererhost_ip = 1;
-
-
+                               if (!is_ip (uptr.hostname)) {
+                                       /* XX resolv the domain name */
+                                       got_refererhost_ip = 1;
This page took 0.084524 seconds and 4 git commands to generate.