php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #34965 tidy is not binary safe
Submitted: 2005-10-24 12:25 UTC Modified: 2010-12-20 10:00 UTC
From: mike@php.net Assigned: john (profile)
Status: Closed Package: Tidy (PECL)
PHP Version: 5CVS-2005-10-24 (CVS) OS: *
Private report: No CVE-ID: None
View Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
If you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: mike@php.net
New email:
PHP Version: OS:

 

 [2005-10-24 12:25 UTC] mike@php.net
Description:
------------
ext/tidy does not use TidyBuffer.size when returning strings.

Patch against PHP_5_1: http://dev.iworks.at/PATCHES/tidy/tidy-PHP_5_1.diff.txt


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-24 15:06 UTC] mike@php.net
I've uploaded a new patch fixing input binary safety too.
 [2005-10-24 16:13 UTC] tony2001@php.net
John, you seem to be the maintainer of ext/tidy.
Please have a look at the patch.
 [2005-10-25 20:06 UTC] mike@php.net
This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.


 [2010-12-20 10:00 UTC] jani@php.net
-Package: Unknown/Other Function +Package: Tidy
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Dec 21 16:01:28 2024 UTC