php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #28625 Max POST size overflow
Submitted: 2004-06-03 20:18 UTC Modified: 2004-06-04 14:48 UTC
From: jordi at bunster dot org Assigned:
Status: Not a bug Package: HTTP related
PHP Version: 4.3.4 OS: Linux
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: jordi at bunster dot org
New email:
PHP Version: OS:

 

 [2004-06-03 20:18 UTC] jordi at bunster dot org
Description:
------------
Giving post_max_size a value equal or greater than 2GB on 
php.ini causes php to overflow the variable it uses to store 
that value. The result is log entries similar to this:

"POST Content-Length of 0 bytes exceeds the limit of 
-2147483648 bytes"

Reproduce code:
---------------
Set post_max_size to 2G or more on php.ini, execute a POST operation on a php script.

Expected result:
----------------
The POST operation should complete, according to the limits 
specified on php.ini

Actual result:
--------------
"POST Content-Length of 0 bytes exceeds the limit of 
-2147483648 bytes" or similar entries on the webserver 
logfile, POST fails.

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2004-06-04 14:48 UTC] derick@php.net
PHP only supports signed integers, which only go to 2GB - 1. After that it 'overflows' to negative values. THis is not considered a bug but a feature.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Fri Dec 27 18:01:30 2024 UTC