Package: libapache2-mod-auth-mellon / 0.12.0-2+deb9u1
Metadata
Package | Version | Patches format |
---|---|---|
libapache2-mod-auth-mellon | 0.12.0-2+deb9u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
01_logout_segfault.patch | (download) |
auth_mellon_handler.c |
6 4 + 2 - 0 ! |
[patch] fix segmentation fault when receiving badly formed logout message. If the logout message is badly formed, we won't get the entityID in `logout->parent.remote_providerID`. If we call `apr_hash_get()` with a null pointer, it will cause a segmentation fault. Add a check to validate that the entityID is correctly set. |
02_session_transfer_vulnerability_CVE 2017 6807.patch | (download) |
auth_mellon.h |
6 5 + 1 - 0 ! |
[patch] fix cross-site session transfer vulnerability MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit mod_auth_mellon did not verify that the site the session was created for was the same site as the site the user accessed. This allows an attacker with access to one web site on a server to use the same |
03_auth_bypass_proxy_CVE 2019 3878.patch | (download) |
mod_auth_mellon.c |
8 7 + 1 - 0 ! |
--- |
04_open_redirect_urls_backslashes_CVE 2019 3877.patch | (download) |
auth_mellon_util.c |
7 7 + 0 - 0 ! |
--- |
1