comparison src/http/ngx_http_parse.c @ 670:ad45b044f1e5 NGINX_1_1_19

nginx 1.1.19 *) Security: specially crafted mp4 file might allow to overwrite memory locations in a worker process if the ngx_http_mp4_module was used, potentially resulting in arbitrary code execution (CVE-2012-2089). Thanks to Matthew Daley. *) Bugfix: nginx/Windows might be terminated abnormally. Thanks to Vincent Lee. *) Bugfix: nginx hogged CPU if all servers in an upstream were marked as "backup". *) Bugfix: the "allow" and "deny" directives might be inherited incorrectly if they were used with IPv6 addresses. *) Bugfix: the "modern_browser" and "ancient_browser" directives might be inherited incorrectly. *) Bugfix: timeouts might be handled incorrectly on Solaris/SPARC. *) Bugfix: in the ngx_http_mp4_module.
author Igor Sysoev <http://sysoev.ru>
date Thu, 12 Apr 2012 00:00:00 +0400
parents 9fbf3ad94cbf
children bfa81a0490a2
comparison
equal deleted inserted replaced
669:3f5d0be5ee74 670:ad45b044f1e5
1095 1095
1096 while (p <= r->uri_end) { 1096 while (p <= r->uri_end) {
1097 1097
1098 /* 1098 /*
1099 * we use "ch = *p++" inside the cycle, but this operation is safe, 1099 * we use "ch = *p++" inside the cycle, but this operation is safe,
1100 * because after the URI there is always at least one charcter: 1100 * because after the URI there is always at least one character:
1101 * the line feed 1101 * the line feed
1102 */ 1102 */
1103 1103
1104 ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, 1104 ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
1105 "s:%d in:'%Xd:%c', out:'%c'", state, ch, ch, *u); 1105 "s:%d in:'%Xd:%c', out:'%c'", state, ch, ch, *u);