php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #34965 tidy is not binary safe
Submitted: 2005-10-24 12:25 UTC Modified: 2010-12-20 10:00 UTC
From: mike@php.net Assigned: john (profile)
Status: Closed Package: Tidy (PECL)
PHP Version: 5CVS-2005-10-24 (CVS) OS: *
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: mike@php.net
New email:
PHP Version: OS:

 

 [2005-10-24 12:25 UTC] mike@php.net
Description:
------------
ext/tidy does not use TidyBuffer.size when returning strings.

Patch against PHP_5_1: http://dev.iworks.at/PATCHES/tidy/tidy-PHP_5_1.diff.txt


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-24 15:06 UTC] mike@php.net
I've uploaded a new patch fixing input binary safety too.
 [2005-10-24 16:13 UTC] tony2001@php.net
John, you seem to be the maintainer of ext/tidy.
Please have a look at the patch.
 [2005-10-25 20:06 UTC] mike@php.net
This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.


 [2010-12-20 10:00 UTC] jani@php.net
-Package: Unknown/Other Function +Package: Tidy
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Dec 21 15:01:29 2024 UTC