summaryrefslogtreecommitdiffhomepage
AgeCommit message (Collapse)AuthorFilesLines
2015-04-07nginx-1.6.3 changes fixrelease-1.6.3Maxim Dounin1-1/+1
2015-04-07release-1.6.3 tagMaxim Dounin1-0/+1
2015-04-07nginx-1.6.3-RELEASEMaxim Dounin1-0/+69
2015-03-23Updated OpenSSL used for win32 builds.Maxim Dounin1-1/+1
2015-03-17Overflow detection in ngx_http_parse_chunked().Ruslan Ermilov1-4/+8
2015-03-17Overflow detection in ngx_http_range_parse().Ruslan Ermilov1-1/+12
2015-03-17Overflow detection in ngx_inet_addr().Ruslan Ermilov1-2/+6
2015-03-17Core: overflow detection in ngx_parse_time() (ticket #732).Ruslan Ermilov1-16/+37
2015-03-17Refactored ngx_parse_time().Ruslan Ermilov1-3/+1
No functional changes.
2015-03-17Core: overflow detection in number parsing functions.Ruslan Ermilov2-52/+72
2015-03-17Core: expose maximum values of time_t and ngx_int_t.Ruslan Ermilov3-0/+5
These are needed to detect overflows.
2015-02-24Core: fixed potential buffer overrun when initializing hash.Maxim Dounin1-1/+1
Initial size as calculated from the number of elements may be bigger than max_size. If this happens, make sure to set size to max_size. Reported by Chris West.
2015-02-04Core: fixed a race resulting in extra sem_post()'s.Roman Arutyunyan1-1/+2
The mtx->wait counter was not decremented if we were able to obtain the lock right after incrementing it. This resulted in unneeded sem_post() calls, eventually leading to EOVERFLOW errors being logged, "sem_post() failed while wake shmtx (75: Value too large for defined data type)". To close the race, mtx->wait is now decremented if we obtain the lock right after incrementing it in ngx_shmtx_lock(). The result can become -1 if a concurrent ngx_shmtx_unlock() decrements mtx->wait before the added code does. However, that only leads to one extra iteration in the next call of ngx_shmtx_lock().
2014-11-28Fixed post_action to not trigger "header already sent" alert.Maxim Dounin1-0/+4
The alert was introduced in 03ff14058272 (1.5.4), and was triggered on each post_action invocation. There is no real need to call header filters in case of post_action, so return NGX_OK from ngx_http_send_header() if r->post_action is set.
2014-11-21SPDY: push pending data while closing a stream as with keepalive.Valentin Bartenev1-1/+51
This helps to avoid delays in sending the last chunk of data because of bad interaction between Nagle's algorithm on nginx side and delayed ACK on the client side. Delays could also be caused by TCP_CORK/TCP_NOPUSH if SPDY was working without SSL and sendfile() was used.
2014-11-20Resolver: fixed use-after-free memory access.Ruslan Ermilov1-4/+4
In 954867a2f0a6, we switched to using resolver node as the timer event data, so make sure we do not free resolver node memory until the corresponding timer is deleted.
2014-11-17SSL: logging level of "inappropriate fallback" (ticket #662).Maxim Dounin1-0/+3
Patch by Erik Dubbelboer.
2014-10-08Fixed possible buffer overrun in "too long header line" logging.Maxim Dounin1-3/+2
Additionally, ellipsis now always added to make it clear that the header logged is incomplete. Reported by Daniil Bondarev.
2014-10-02Core: fixed buffer overrun when hash max_size reached.Yichun Zhang1-0/+2
2015-04-06Version bump.Maxim Dounin1-2/+2
2014-09-16release-1.6.2 tagMaxim Dounin1-0/+1
2014-09-16nginx-1.6.2-RELEASErelease-1.6.2Maxim Dounin1-0/+45
2014-09-15Updated OpenSSL used for win32 builds.Maxim Dounin1-1/+1
2014-09-15SSL: session id context now includes certificate hash.Maxim Dounin1-2/+96
This prevents inappropriate session reuse in unrelated server{} blocks, while preserving ability to restore sessions on other servers when using TLS Session Tickets. Additionally, session context is now set even if there is no session cache configured. This is needed as it's also used for TLS Session Tickets. Thanks to Antoine Delignat-Lavaud and Piotr Sikora.
2014-08-19Resolver: notify all waiting requests on timeout.Ruslan Ermilov1-8/+16
If a "resolver_timeout" occurs, only the first waiting request was notified. Other requests may hang forever.
2014-07-16Resolver: fixed resend on malformed responses.Ruslan Ermilov1-2/+27
DNS request resend on malformed responses was broken in 98876ce2a7fd (1.5.8). Reported by Pramod Korathota.
2014-09-15Version bump.Maxim Dounin1-2/+2
2014-08-05release-1.6.1 tagMaxim Dounin1-0/+1
2014-08-05nginx-1.6.1-RELEASErelease-1.6.1Maxim Dounin1-0/+46
2014-08-05Mail: discard pipelined commands after SMTP STARTTLS.Maxim Dounin1-0/+3
The bug had appeared in nginx 1.5.6 (04e43d03e153). Reported by Chris Boulton.
2014-07-18Reset of r->uri.len on URI parsing errors.Maxim Dounin1-0/+2
This ensures that debug logging and the $uri variable (if used in 400 Bad Request processing) will not try to access uninitialized memory. Found by Sergey Bobrov.
2014-07-04Updated PCRE used for win32 builds.Maxim Dounin1-1/+1
2014-06-17Updated OpenSSL used for win32 builds.Maxim Dounin1-1/+1
2014-05-21Mail: added a check for the number of arguments in MAIL/RCPT.Maxim Dounin1-0/+10
Missed during introduction of the SMTP pipelining support (04e43d03e153, 1.5.6). Previously, the check wasn't needed as s->buffer was used directly and the number of arguments didn't matter. Reported by Svyatoslav Nikolsky.
2014-08-05Version bump.Maxim Dounin1-2/+2
2014-04-24release-1.6.0 tagMaxim Dounin1-0/+1
2014-04-24nginx-1.6.0-RELEASErelease-1.6.0Maxim Dounin1-0/+14
2014-04-23Missed comma fixed. A couple of Latin symbols plugged intoMaxim Konovalov1-3/+3
Russian text changed to Russian counterparts.
2014-04-18Version bump.Maxim Dounin1-2/+2
2014-04-18stable-1.6 branchMaxim Dounin0-0/+0
2014-04-16SPDY: fixed typo in log message.Valentin Bartenev1-1/+1
2014-04-16Fixed missing "static" in declaration of ngx_http_gzip_quantity().Valentin Bartenev1-1/+1
2014-04-09SPDY: moved a variable initialization near to its check.Valentin Bartenev1-2/+2
This should prevent attempts of using pointer before it was checked, since all modern compilers are able to spot access to uninitialized variable. No functional changes.
2014-04-08SPDY: fixed arguments supplied for an error message.Valentin Bartenev1-1/+1
2014-04-08Version bump.Valentin Bartenev1-2/+2
2014-04-08release-1.5.13 tagMaxim Dounin1-0/+1
2014-04-08nginx-1.5.13-RELEASErelease-1.5.13Maxim Dounin1-0/+93
2014-04-08Updated OpenSSL used for win32 builds.Maxim Dounin1-1/+1
2014-04-07SPDY: avoid creating flush frames.Valentin Bartenev1-33/+42
Previously, an empty frame object was created for an output chain that contains only sync or flush empty buffers. But since 39d7eef2e332 every DATA frame has the flush flag set on its last buffer, so there's no need any more in additional flush buffers in the output queue and they can be skipped. Note that such flush frames caused an incorrect $body_bytes_sent value.
2014-04-07SPDY: consistently handle control frames with unknown type.Valentin Bartenev1-5/+10
The SPDY draft 2 specification requires that if an endpoint receives a control frame for a type it does not recognize, it must ignore the frame. But the 3 and 3.1 drafts don't seem to declare any behavior for such case. Then sticking with the previous draft in this matter looks to be right. But previously, only 8 least significant bits of the type field were parsed while the rest of 16 bits of the field were checked against zero. Though there are no known frame types bigger than 255, this resulted in inconsistency in handling of such frames: they were not recognized as valid frames at all, and the connection was closed.