php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #31494 BC break in unserialize
Submitted: 2005-01-11 18:56 UTC Modified: 2005-01-11 21:26 UTC
From: nlopess@php.net Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 5CVS-2005-01-11 (dev) OS: n/a
Private report: No CVE-ID: None
View Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
If you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: nlopess@php.net
New email:
PHP Version: OS:

 

 [2005-01-11 18:56 UTC] nlopess@php.net
Description:
------------
It seems there was another BC break in unserialize().

Reproduce code:
---------------
my pear.ini file:
#PEAR_Config 0.9
a:7:{s:15:"preferred_state";s:6:"stable beta";s:7:"bin_dir";s:11:"C:\php\PEAR";s:7:"php_dir";s:16:"C:\php\PEAR\pear";s:7:"doc_dir";s:21:"C:\php\PEAR\pear\docs";
s:8:"data_dir";s:21:"C:\php\PEAR\pear\data";s:8:"test_dir";s:22:"C:\php\PEAR\pear\tests";s:7:"php_bin";s:14:"C:\PHP\php.exe";}


php -r "print_r(unserialize(file_get_contents('pear.ini')));"

Actual result:
--------------
Notice: unserialize() Error at offset 0 of 303 bytes in Command line code on line 1

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-01-11 21:26 UTC] derick@php.net
Your code is bogus, as you're not stripping out the first line which has the #pear config comment on it.
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Mon Nov 24 00:00:01 2025 UTC