comparison src/http/ngx_http.c @ 670:ad45b044f1e5 NGINX_1_1_19

nginx 1.1.19 *) Security: specially crafted mp4 file might allow to overwrite memory locations in a worker process if the ngx_http_mp4_module was used, potentially resulting in arbitrary code execution (CVE-2012-2089). Thanks to Matthew Daley. *) Bugfix: nginx/Windows might be terminated abnormally. Thanks to Vincent Lee. *) Bugfix: nginx hogged CPU if all servers in an upstream were marked as "backup". *) Bugfix: the "allow" and "deny" directives might be inherited incorrectly if they were used with IPv6 addresses. *) Bugfix: the "modern_browser" and "ancient_browser" directives might be inherited incorrectly. *) Bugfix: timeouts might be handled incorrectly on Solaris/SPARC. *) Bugfix: in the ngx_http_mp4_module.
author Igor Sysoev <http://sysoev.ru>
date Thu, 12 Apr 2012 00:00:00 +0400
parents d0f7a625f27c
children 5cb5db9975ba
comparison
equal deleted inserted replaced
669:3f5d0be5ee74 670:ad45b044f1e5
1415 ngx_sort(port[p].addrs.elts, (size_t) port[p].addrs.nelts, 1415 ngx_sort(port[p].addrs.elts, (size_t) port[p].addrs.nelts,
1416 sizeof(ngx_http_conf_addr_t), ngx_http_cmp_conf_addrs); 1416 sizeof(ngx_http_conf_addr_t), ngx_http_cmp_conf_addrs);
1417 1417
1418 /* 1418 /*
1419 * check whether all name-based servers have the same 1419 * check whether all name-based servers have the same
1420 * configuraiton as a default server for given address:port 1420 * configuration as a default server for given address:port
1421 */ 1421 */
1422 1422
1423 addr = port[p].addrs.elts; 1423 addr = port[p].addrs.elts;
1424 for (a = 0; a < port[p].addrs.nelts; a++) { 1424 for (a = 0; a < port[p].addrs.nelts; a++) {
1425 1425