mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-16 07:56:12 +03:00
Fixed: chuck null pointer when unknown CT is sent and over in-memory limit
This commit is contained in:
parent
d8262fc6cf
commit
0840b13612
@ -170,6 +170,7 @@ static apr_status_t modsecurity_request_body_store_memory(modsec_rec *msr,
|
|||||||
|
|
||||||
/* Would storing this chunk mean going over the limit? */
|
/* Would storing this chunk mean going over the limit? */
|
||||||
if ((msr->msc_reqbody_spilltodisk)
|
if ((msr->msc_reqbody_spilltodisk)
|
||||||
|
&& (msr->txcfg->reqbody_buffering != REQUEST_BODY_FORCEBUF_ON)
|
||||||
&& (msr->msc_reqbody_length + length > (apr_size_t)msr->txcfg->reqbody_inmemory_limit))
|
&& (msr->msc_reqbody_length + length > (apr_size_t)msr->txcfg->reqbody_inmemory_limit))
|
||||||
{
|
{
|
||||||
msc_data_chunk **chunks;
|
msc_data_chunk **chunks;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user