diff options
author | jake%acutex.net <> | 2001-10-25 21:46:58 +0000 |
---|---|---|
committer | jake%acutex.net <> | 2001-10-25 21:46:58 +0000 |
commit | 3a866ab78f91873f42a13710f299bcb0f176b49c (patch) | |
tree | dffaf8dcfde7aa423bc16223ed5ad844ef1bbdba /process_bug.cgi | |
parent | fee1c812c7eac574ccfd50c57e796e690ba049e4 (diff) | |
download | bugs-3a866ab78f91873f42a13710f299bcb0f176b49c.tar bugs-3a866ab78f91873f42a13710f299bcb0f176b49c.tar.gz bugs-3a866ab78f91873f42a13710f299bcb0f176b49c.tar.bz2 bugs-3a866ab78f91873f42a13710f299bcb0f176b49c.tar.xz bugs-3a866ab78f91873f42a13710f299bcb0f176b49c.zip |
Bug 104065 - Stop uninitilized string warnings from getting into the error log when the login cookie doesn't exist.
Patch by Dave Miller <justdave@syndicomm.com>
r= gerv@mozilla.org, jake@acutex.net
Diffstat (limited to 'process_bug.cgi')
-rwxr-xr-x | process_bug.cgi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/process_bug.cgi b/process_bug.cgi index 416ee9ccd..9ac1e8744 100755 --- a/process_bug.cgi +++ b/process_bug.cgi @@ -94,7 +94,7 @@ if (defined $::FORM{'dup_id'} && $::FORM{'knob'} eq "duplicate") { # list. Thus we have to make sure this bug ID is also valid, # since a malicious cracker might alter their cookies for the purpose # gaining access to bugs they are not authorized to access. -if ( $::COOKIE{"BUGLIST"} ne "" && defined $::FORM{'id'} ) { +if ( defined $::COOKIE{"BUGLIST"} && defined $::FORM{'id'} ) { my @buglist = split( /:/ , $::COOKIE{"BUGLIST"} ); my $idx = lsearch( \@buglist , $::FORM{"id"} ); if ($idx < $#buglist) { |