Overview
Comment: | Fixed NULL pointer dereference and also possible buffer overflow processing HTTP request, created in [8cb189c633] |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
dd737cd8c71ffeda779fd947a385fcc8 |
User & Date: | rkeene on 2014-02-12 17:42:15 |
Other Links: | manifest | tags |
Context
2014-02-12
| ||
17:56 | Filed 1.6 check-in: f7cedf8636 user: rkeene tags: trunk, 1.6 | |
17:42 | Fixed NULL pointer dereference and also possible buffer overflow processing HTTP request, created in [8cb189c633] check-in: dd737cd8c7 user: rkeene tags: trunk | |
06:11 | Updated to use time to ensure that a duplicate ETag is never generated check-in: 7e211d072e user: rkeene tags: trunk | |
Changes
Modified filed.c from [ba4c14a79b] to [64aa094753].
︙ | ︙ | |||
678 679 680 681 682 683 684 685 686 687 688 689 690 691 | } else { /* HEAD request */ buffer_st->method = FILED_REQUEST_METHOD_HEAD; } /* Note path */ strcpy(buffer_st->path, path); for (i = 0; i < 100; i++) { fgets_ret = fgets(buffer, buffer_len, fp); if (fgets_ret == NULL) { break; } | > > > | 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 | } else { /* HEAD request */ buffer_st->method = FILED_REQUEST_METHOD_HEAD; } /* Note path */ strcpy(buffer_st->path, path); /* Reset buffer for later use */ buffer = buffer_st->tmpbuf; for (i = 0; i < 100; i++) { fgets_ret = fgets(buffer, buffer_len, fp); if (fgets_ret == NULL) { break; } |
︙ | ︙ |