From 03fcee5d78450fcb4a2055a23e538655a93751b7 Mon Sep 17 00:00:00 2001 From: Maxim Dounin Date: Mon, 3 Mar 2014 17:39:53 +0400 Subject: Request body: avoid potential overflow. --- src/http/ngx_http_request_body.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src/http') diff --git a/src/http/ngx_http_request_body.c b/src/http/ngx_http_request_body.c index 1d8bc4a28..e9cf3e930 100644 --- a/src/http/ngx_http_request_body.c +++ b/src/http/ngx_http_request_body.c @@ -953,13 +953,13 @@ ngx_http_request_body_chunked_filter(ngx_http_request_t *r, ngx_chain_t *in) if (clcf->client_max_body_size && clcf->client_max_body_size - < r->headers_in.content_length_n + rb->chunked->size) + - r->headers_in.content_length_n < rb->chunked->size) { ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, "client intended to send too large chunked " - "body: %O bytes", - r->headers_in.content_length_n - + rb->chunked->size); + "body: %O+%O bytes", + r->headers_in.content_length_n, + rb->chunked->size); r->lingering_close = 1; -- cgit