head	1.2;
access;
symbols
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2006.05.09.10.35.56;	author dinoex;	state dead;
branches;
next	1.1;

1.1
date	2005.12.14.15.52.42;	author dinoex;	state Exp;
branches;
next	;


desc
@@


1.2
log
@- update to mod_ssl-2.8.26-1.3.35
- update to mod_accel-1.0.34
- remove patch, verfied it is in distribution
@
text
@--- src/main/util.c (original)
+++ src/main/util.c Mon Dec 12 08:36:54 2005
@@@@ -1722,6 +1722,8 @@@@
 	    j += 3;
 	else if (s[i] == '&')
 	    j += 4;
+	else if (s[i] == '"')
+	    j += 5;
 
     if (j == 0)
 	return ap_pstrndup(p, s, i);
@@@@ -1739,6 +1741,10 @@@@
 	else if (s[i] == '&') {
 	    memcpy(&x[j], "&amp;", 5);
 	    j += 4;
+	}
+	else if (s[i] == '"') {
+	    memcpy(&x[j], "&quot;", 6);
+	    j += 5;
 	}
 	else
 	    x[j] = s[i];

--- src/modules/standard/mod_imap.c (original)
+++ src/modules/standard/mod_imap.c Mon Dec 12 08:36:54 2005
@@@@ -328,7 +328,7 @@@@
     if (!strcasecmp(value, "referer")) {
         referer = ap_table_get(r->headers_in, "Referer");
         if (referer && *referer) {
-	    return ap_pstrdup(r->pool, referer);
+	    return ap_escape_html(r->pool, referer);
         }
         else {
 	    /* XXX:  This used to do *value = '\0'; ... which is totally bogus

@


1.1
log
@- Securitry Fix
SECURITY: CVE-2005-3352 (cve.mitre.org)

Obtained from:	ports
@
text
@@

