diff options
author | Maxim Dounin <mdounin@mdounin.ru> | 2019-07-18 18:27:54 +0300 |
---|---|---|
committer | Maxim Dounin <mdounin@mdounin.ru> | 2019-07-18 18:27:54 +0300 |
commit | 2187586207e1465d289ae64cedc829719a048a39 (patch) | |
tree | 34475060fce3c07c764774604aa9127c872ef9eb /src/core/ngx_hash.c | |
parent | ad42d70fed67c1e7098055fb25721ab904db2389 (diff) | |
download | nginx-2187586207e1465d289ae64cedc829719a048a39.tar.gz nginx-2187586207e1465d289ae64cedc829719a048a39.zip |
Xslt: fixed potential buffer overflow with null character.
Due to shortcomings of the ccv->zero flag implementation in complex value
interface, length of the resulting string from ngx_http_complex_value()
might either not include terminating null character or include it,
so the only safe way to work with the result is to use it as a
null-terminated string.
Reported by Patrick Wollgast.
Diffstat (limited to 'src/core/ngx_hash.c')
0 files changed, 0 insertions, 0 deletions