You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2014/06/01 20:31:28 UTC

[Bug 56289] Buffer overflow in mod_proxy_html's string replacement can cause a segfault

https://issues.apache.org/bugzilla/show_bug.cgi?id=56289

--- Comment #2 from Nick Kew <ni...@webthing.com> ---
Your patch appears to dispense with null-termination in the buffer.  That's
good if it doesn't break anything, and the reasons for null-termination in the
buffer are lost in the mists of time!  Is it well-tested with both strings and
regexps and ProxyHTMLExtended?

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org