On Sun, Jan 12, 2003 at 12:12:39AM +0100, Sascha Schumann wrote: > As many past security advisories have shown, signedness > issues are the frequent cause for severe vulnerabilities in > software (recent examples include MySQL, OpenBSD kernel).
Actually codes like below produce vulnerble runtimes because the length of string is expected to be a positive integer value... int maxlen; ... if ((int)Z_STRLEN_P(length) > maxlen) { RETURN_FALSE; } memcpy(allocated_buf, Z_STRVAL_P(length), Z_STRLEN_P(length)); > Any objections? No objection from me. Moriyoshi -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php