php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #31494 BC break in unserialize
Submitted: 2005-01-11 18:56 UTC Modified: 2005-01-11 21:26 UTC
From: nlopess@php.net Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 5CVS-2005-01-11 (dev) OS: n/a
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: nlopess@php.net
New email:
PHP Version: OS:

 

 [2005-01-11 18:56 UTC] nlopess@php.net
Description:
------------
It seems there was another BC break in unserialize().

Reproduce code:
---------------
my pear.ini file:
#PEAR_Config 0.9
a:7:{s:15:"preferred_state";s:6:"stable beta";s:7:"bin_dir";s:11:"C:\php\PEAR";s:7:"php_dir";s:16:"C:\php\PEAR\pear";s:7:"doc_dir";s:21:"C:\php\PEAR\pear\docs";
s:8:"data_dir";s:21:"C:\php\PEAR\pear\data";s:8:"test_dir";s:22:"C:\php\PEAR\pear\tests";s:7:"php_bin";s:14:"C:\PHP\php.exe";}


php -r "print_r(unserialize(file_get_contents('pear.ini')));"

Actual result:
--------------
Notice: unserialize() Error at offset 0 of 303 bytes in Command line code on line 1

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-01-11 21:26 UTC] derick@php.net
Your code is bogus, as you're not stripping out the first line which has the #pear config comment on it.
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Mon Nov 24 00:00:01 2025 UTC