Mercurial > hg > nginx-vendor-0-8
comparison src/http/ngx_http_parse.c @ 526:0161f3197817 NGINX_0_8_15
nginx 0.8.15
*) Security: a segmentation fault might occur in worker process while
specially crafted request handling.
Thanks to Chris Ries.
*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
were defined, then the name .sub.domain.tld was matched by
.domain.tld.
*) Bugfix: in transparency support in the ngx_http_image_filter_module.
*) Bugfix: in file AIO.
*) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11.
*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Mon, 14 Sep 2009 00:00:00 +0400 |
parents | 80f7156c2965 |
children | 4c5d2c627a6c |
comparison
equal
deleted
inserted
replaced
525:1b64f9884263 | 526:0161f3197817 |
---|---|
1132 #if (NGX_WIN32) | 1132 #if (NGX_WIN32) |
1133 case '\\': | 1133 case '\\': |
1134 #endif | 1134 #endif |
1135 case '/': | 1135 case '/': |
1136 state = sw_slash; | 1136 state = sw_slash; |
1137 u -= 4; | 1137 u -= 5; |
1138 if (u < r->uri.data) { | 1138 for ( ;; ) { |
1139 return NGX_HTTP_PARSE_INVALID_REQUEST; | 1139 if (u < r->uri.data) { |
1140 } | 1140 return NGX_HTTP_PARSE_INVALID_REQUEST; |
1141 while (*(u - 1) != '/') { | 1141 } |
1142 if (*u == '/') { | |
1143 u++; | |
1144 break; | |
1145 } | |
1142 u--; | 1146 u--; |
1143 } | 1147 } |
1144 break; | 1148 break; |
1145 case '%': | 1149 case '%': |
1146 quoted_state = state; | 1150 quoted_state = state; |