mirror of https://github.com/openresty/openresty
backported the patch to the nginx core for the latest SPDY security vulnerability (CVE-2014-0133).
parent
d21cc33749
commit
37ba2b1015
@ -0,0 +1,11 @@
|
||||
--- src/http/ngx_http_spdy.c
|
||||
+++ src/http/ngx_http_spdy.c
|
||||
@@ -1849,7 +1849,7 @@ static u_char *
|
||||
ngx_http_spdy_state_save(ngx_http_spdy_connection_t *sc,
|
||||
u_char *pos, u_char *end, ngx_http_spdy_handler_pt handler)
|
||||
{
|
||||
-#if (NGX_DEBUG)
|
||||
+#if 1
|
||||
if (end - pos > NGX_SPDY_STATE_BUFFER_SIZE) {
|
||||
ngx_log_error(NGX_LOG_ALERT, sc->connection->log, 0,
|
||||
"spdy state buffer overflow: "
|
Loading…
Reference in New Issue