I'd feel slightly happier if it used spprintf() instead of manually
calculating the buffer length, but otherwise I'm okay with it.

--Wez.


On Wed, 27 Oct 2004 09:51:52 -0700, Andi Gutmans <[EMAIL PROTECTED]> wrote:
> This patch makes sense to me. Anyone have a problem with it?
> 
> Andi
> 
> 
> 
> At 02:14 PM 10/27/2004 +0200, Vladimir Zidar wrote:
> >  When safe_mode is set to 'on', popen() uses char buf[1024] to build
> > argument list. This is not good, as it truncates command line without notice.
> >  This is NOT operating system limit - as noted on bugreport, but PHP bug.
> >
> >  If anybody cares, here is fix for this bug under 4.3.9:
> >
> >  http://leya.mindnever.org/~mr_w/php-popen.patch.gz
> >
> >  PS, didn't have time to look at PHP 5 yet, but I suppose this fix could
> >work also with minor tweaks.
> >
> >
> >--
> >Vladimir Zidar, Programmer
> >
> >MindNever Foodstuff TRDG.
> >Head Office Branch
> >
> >Tel: +381-63-550161, +385-98-9574261
> >http://www.mindnever.org, icq: 15414204, mail: [EMAIL PROTECTED]
> >
> >--
> >PHP Internals - PHP Runtime Development Mailing List
> >To unsubscribe, visit: http://www.php.net/unsub.php
> 
> --
> PHP Internals - PHP Runtime Development Mailing List
> To unsubscribe, visit: http://www.php.net/unsub.php
> 
>

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to