Mercurial > hg > nginx-vendor-current
comparison src/http/ngx_http_parse.c @ 670:ad45b044f1e5 NGINX_1_1_19
nginx 1.1.19
*) Security: specially crafted mp4 file might allow to overwrite memory
locations in a worker process if the ngx_http_mp4_module was used,
potentially resulting in arbitrary code execution (CVE-2012-2089).
Thanks to Matthew Daley.
*) Bugfix: nginx/Windows might be terminated abnormally.
Thanks to Vincent Lee.
*) Bugfix: nginx hogged CPU if all servers in an upstream were marked as
"backup".
*) Bugfix: the "allow" and "deny" directives might be inherited
incorrectly if they were used with IPv6 addresses.
*) Bugfix: the "modern_browser" and "ancient_browser" directives might
be inherited incorrectly.
*) Bugfix: timeouts might be handled incorrectly on Solaris/SPARC.
*) Bugfix: in the ngx_http_mp4_module.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Thu, 12 Apr 2012 00:00:00 +0400 |
parents | 9fbf3ad94cbf |
children | bfa81a0490a2 |
comparison
equal
deleted
inserted
replaced
669:3f5d0be5ee74 | 670:ad45b044f1e5 |
---|---|
1095 | 1095 |
1096 while (p <= r->uri_end) { | 1096 while (p <= r->uri_end) { |
1097 | 1097 |
1098 /* | 1098 /* |
1099 * we use "ch = *p++" inside the cycle, but this operation is safe, | 1099 * we use "ch = *p++" inside the cycle, but this operation is safe, |
1100 * because after the URI there is always at least one charcter: | 1100 * because after the URI there is always at least one character: |
1101 * the line feed | 1101 * the line feed |
1102 */ | 1102 */ |
1103 | 1103 |
1104 ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 1104 ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
1105 "s:%d in:'%Xd:%c', out:'%c'", state, ch, ch, *u); | 1105 "s:%d in:'%Xd:%c', out:'%c'", state, ch, ch, *u); |