comparison src/http/modules/ngx_http_ssi_filter_module.c @ 670:ad45b044f1e5 NGINX_1_1_19

nginx 1.1.19 *) Security: specially crafted mp4 file might allow to overwrite memory locations in a worker process if the ngx_http_mp4_module was used, potentially resulting in arbitrary code execution (CVE-2012-2089). Thanks to Matthew Daley. *) Bugfix: nginx/Windows might be terminated abnormally. Thanks to Vincent Lee. *) Bugfix: nginx hogged CPU if all servers in an upstream were marked as "backup". *) Bugfix: the "allow" and "deny" directives might be inherited incorrectly if they were used with IPv6 addresses. *) Bugfix: the "modern_browser" and "ancient_browser" directives might be inherited incorrectly. *) Bugfix: timeouts might be handled incorrectly on Solaris/SPARC. *) Bugfix: in the ngx_http_mp4_module.
author Igor Sysoev <http://sysoev.ru>
date Thu, 12 Apr 2012 00:00:00 +0400
parents bf8b55a5ac89
children f41d4b305d22
comparison
equal deleted inserted replaced
669:3f5d0be5ee74 670:ad45b044f1e5
712 goto ssi_error; 712 goto ssi_error;
713 } 713 }
714 714
715 if (ctx->params.nelts > NGX_HTTP_SSI_MAX_PARAMS) { 715 if (ctx->params.nelts > NGX_HTTP_SSI_MAX_PARAMS) {
716 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, 716 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,
717 "too many SSI command paramters: \"%V\"", 717 "too many SSI command parameters: \"%V\"",
718 &ctx->command); 718 &ctx->command);
719 goto ssi_error; 719 goto ssi_error;
720 } 720 }
721 721
722 ngx_memzero(params, 722 ngx_memzero(params,