mirror of
				https://github.com/openresty/openresty.git
				synced 2024-10-13 00:29:41 +00:00 
			
		
		
		
	backported the patch to the nginx core for the latest SPDY security vulnerability (CVE-2014-0133).
This commit is contained in:
		
							
								
								
									
										11
									
								
								patches/patch.2014.spdy2.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								patches/patch.2014.spdy2.txt
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,11 @@ | ||||
| --- src/http/ngx_http_spdy.c | ||||
| +++ src/http/ngx_http_spdy.c | ||||
| @@ -1849,7 +1849,7 @@ static u_char * | ||||
|  ngx_http_spdy_state_save(ngx_http_spdy_connection_t *sc, | ||||
|      u_char *pos, u_char *end, ngx_http_spdy_handler_pt handler) | ||||
|  { | ||||
| -#if (NGX_DEBUG) | ||||
| +#if 1 | ||||
|      if (end - pos > NGX_SPDY_STATE_BUFFER_SIZE) { | ||||
|          ngx_log_error(NGX_LOG_ALERT, sc->connection->log, 0, | ||||
|                        "spdy state buffer overflow: " | ||||
		Reference in New Issue
	
	Block a user