diff options
| author | 2013-05-15 18:52:00 +0000 | |
|---|---|---|
| committer | 2013-05-15 18:52:00 +0000 | |
| commit | 49441a589f6db81e98f5e4d768fa450ad95e475e (patch) | |
| tree | 81419fcc72e53dc86e81dea971d84ca916e1c4b8 /usr.sbin/nginx/src/http/ngx_http_file_cache.c | |
| parent | Don't let cursor position overflow when reflowing, from Christopher (diff) | |
| download | wireguard-openbsd-49441a589f6db81e98f5e4d768fa450ad95e475e.tar.xz wireguard-openbsd-49441a589f6db81e98f5e4d768fa450ad95e475e.zip | |
update to 1.2.9; several bugfixes and security fix for CVE-2013-2070
Diffstat (limited to 'usr.sbin/nginx/src/http/ngx_http_file_cache.c')
| -rw-r--r-- | usr.sbin/nginx/src/http/ngx_http_file_cache.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/usr.sbin/nginx/src/http/ngx_http_file_cache.c b/usr.sbin/nginx/src/http/ngx_http_file_cache.c index bd6cebadd12..6d94c503425 100644 --- a/usr.sbin/nginx/src/http/ngx_http_file_cache.c +++ b/usr.sbin/nginx/src/http/ngx_http_file_cache.c @@ -1674,8 +1674,6 @@ ngx_http_file_cache_set_slot(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) p = (u_char *) ngx_strchr(name.data, ':'); if (p) { - *p = '\0'; - name.len = p - name.data; p++; |
