42ed4e34d5
processing feature (CVE-2023-49285) Resolves: RHEL-18342 - squid:4/squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) Resolves: RHEL-18230 - squid:4/squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) Resolves: RHEL-15911 - squid:4/squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) Resolves: RHEL-18251 - squid crashes in assertion when a parent peer exists Resolves: RHEL-14794 - squid: squid multiple issues in HTTP response caching (CVE-2023-5824) Resolves: RHEL-14803 - squid: squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) Resolves: RHEL-14777 - squid: squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846)
25 lines
794 B
Diff
25 lines
794 B
Diff
diff --git a/src/anyp/Uri.cc b/src/anyp/Uri.cc
|
|
index 20b9bf1..81ebb18 100644
|
|
--- a/src/anyp/Uri.cc
|
|
+++ b/src/anyp/Uri.cc
|
|
@@ -173,6 +173,10 @@ urlInitialize(void)
|
|
assert(0 == matchDomainName("*.foo.com", ".foo.com", mdnHonorWildcards));
|
|
assert(0 != matchDomainName("*.foo.com", "foo.com", mdnHonorWildcards));
|
|
|
|
+ assert(0 != matchDomainName("foo.com", ""));
|
|
+ assert(0 != matchDomainName("foo.com", "", mdnHonorWildcards));
|
|
+ assert(0 != matchDomainName("foo.com", "", mdnRejectSubsubDomains));
|
|
+
|
|
/* more cases? */
|
|
}
|
|
|
|
@@ -756,6 +760,8 @@ matchDomainName(const char *h, const char *d, MatchDomainNameFlags flags)
|
|
return -1;
|
|
|
|
dl = strlen(d);
|
|
+ if (dl == 0)
|
|
+ return 1;
|
|
|
|
/*
|
|
* Start at the ends of the two strings and work towards the
|