From: Antony Dovgal Date: Wed, 1 Feb 2006 10:32:38 +0000 (+0000) Subject: MFH: fix #36242 (Possible memory corruption in stream_select()) X-Git-Tag: php-4.4.3RC1~63 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=6eb4034257144d09bcc83b821cccea98db5f941c;p=php MFH: fix #36242 (Possible memory corruption in stream_select()) --- diff --git a/NEWS b/NEWS index 6aa4eaf013..5eadb57d10 100644 --- a/NEWS +++ b/NEWS @@ -2,6 +2,7 @@ PHP 4 NEWS ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| ?? ??? 2006, Version 4.4.3 - Added a check for special characters in the session name. (Ilia) +- Fixed bug #36242 (Possible memory corruption in stream_select()). (Tony) - Fixed bug #36223 (curl bypasses open_basedir restrictions). (Tony) - Fixed bug #36148 (unpack("H*hex", $data) is adding an extra character to the end of the string). (Ilia) diff --git a/ext/standard/file.c b/ext/standard/file.c index 98dbcf4527..5c911df70b 100644 --- a/ext/standard/file.c +++ b/ext/standard/file.c @@ -819,7 +819,7 @@ PHP_FUNCTION(stream_select) /* If seconds is not set to null, build the timeval, else we wait indefinitely */ if (sec != NULL) { - convert_to_long_ex(&sec); + convert_to_long(sec); if (usec > 999999) { tv.tv_sec = Z_LVAL_P(sec) + (usec / 1000000);