Mercurial > hg > nginx-ranges
comparison src/http/modules/ngx_http_referer_module.c @ 537:0161f3197817 NGINX_0_8_15
nginx 0.8.15
*) Security: a segmentation fault might occur in worker process while
specially crafted request handling.
Thanks to Chris Ries.
*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
were defined, then the name .sub.domain.tld was matched by
.domain.tld.
*) Bugfix: in transparency support in the ngx_http_image_filter_module.
*) Bugfix: in file AIO.
*) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11.
*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Mon, 14 Sep 2009 00:00:00 +0400 |
parents | f39b9e29530d |
children | e19e5f542878 |
comparison
equal
deleted
inserted
replaced
536:1b64f9884263 | 537:0161f3197817 |
---|---|
504 #if (NGX_PCRE) | 504 #if (NGX_PCRE) |
505 ngx_str_t err; | 505 ngx_str_t err; |
506 ngx_regex_elt_t *re; | 506 ngx_regex_elt_t *re; |
507 u_char errstr[NGX_MAX_CONF_ERRSTR]; | 507 u_char errstr[NGX_MAX_CONF_ERRSTR]; |
508 | 508 |
509 if (name->len == 1) { | |
510 ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, "empty regex in \"%V\"", name); | |
511 return NGX_CONF_ERROR; | |
512 } | |
513 | |
509 if (rlcf->regex == NGX_CONF_UNSET_PTR) { | 514 if (rlcf->regex == NGX_CONF_UNSET_PTR) { |
510 rlcf->regex = ngx_array_create(cf->pool, 2, sizeof(ngx_regex_elt_t)); | 515 rlcf->regex = ngx_array_create(cf->pool, 2, sizeof(ngx_regex_elt_t)); |
511 if (rlcf->regex == NULL) { | 516 if (rlcf->regex == NULL) { |
512 return NGX_CONF_ERROR; | 517 return NGX_CONF_ERROR; |
513 } | 518 } |
560 ngx_hash_key_t *first, *second; | 565 ngx_hash_key_t *first, *second; |
561 | 566 |
562 first = (ngx_hash_key_t *) one; | 567 first = (ngx_hash_key_t *) one; |
563 second = (ngx_hash_key_t *) two; | 568 second = (ngx_hash_key_t *) two; |
564 | 569 |
565 return ngx_strcmp(first->key.data, second->key.data); | 570 return ngx_dns_strcmp(first->key.data, second->key.data); |
566 } | 571 } |