php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #287 Typo - bad use of variable (possible buffer overflow?)
Submitted: 1998-04-19 18:14 UTC Modified: 1998-04-19 18:21 UTC
From: miri at punknet dot cz Assigned: rasmus (profile)
Status: Closed Package: Other
PHP Version: 3.0 Release Candidate 4 OS: Linux
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: miri at punknet dot cz
New email:
PHP Version: OS:

 

 [1998-04-19 18:14 UTC] miri at punknet dot cz
Probably typo at functions/head.c:491

-char *tempstr2=emalloc(strlen(str)+14);
+char *tempstr2=emalloc(strlen(tempstr)+14);
 sprintf(tempstr2,"Set-Cookie: %s\015\012",tempstr);

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1998-04-19 18:21 UTC] rasmus
Fixed
 [2014-09-26 16:17 UTC] datibbaw@php.net
Automatic comment from SVN on behalf of datibbaw
Revision: http://svn.php.net/viewvc/?view=revision&revision=334988
Log: Added documentation for PR #287:

- add ability to use array keys with array_filter()
 
PHP Copyright © 2001-2022 The PHP Group
All rights reserved.
Last updated: Sat May 21 23:03:34 2022 UTC