|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #16364 Overflow with fgetcsv()
Submitted: 2002-03-30 17:39 UTC Modified: 2002-08-16 01:00 UTC
From: Assigned:
Status: No Feedback Package: Filesystem function related
PHP Version: 4.0CVS-2002-03-30 OS: ANY(?)
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Bug Type:
New email:
PHP Version: OS:


 [2002-03-30 17:39 UTC]
PHP4.2.0-dev overflow with fgetcsv() with multi-byte char (EUC-JP). It also seems not working for single byte chars.

[Sun Mar 31 07:20:38 2002]  Script:  '-'
file.c(2180) : Block 0x083063C0 status:
Beginning:      OK (allocated on file.c:2096, 12 bytes)
      End:      Overflown (magic=0x2A8FCC00 instead of 0x2A8FCC84)
                1 byte(s) overflown
file.c(2096) :  Freeing 0x08306664 (12 bytes), script=-
Last leak repeated 1183 times


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2002-07-01 15:29 UTC]
Hm... does this just mean that fgetcsv() is not binary safe?
Can you provide some more information? Sample script, sample data, etc?
 [2002-07-01 17:37 UTC]
A sample script would be nice to have too.
And Hartmut fixed something in that function just recently..

 [2002-08-16 01:00 UTC] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a month, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
PHP Copyright © 2001-2018 The PHP Group
All rights reserved.
Last updated: Sun Nov 19 01:31:42 2017 UTC