php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #68820 AV in sprintf
Submitted: 2015-01-12 23:18 UTC Modified: 2021-01-03 04:22 UTC
From: mattficken@php.net Assigned: cmb (profile)
Status: No Feedback Package: Unknown/Other Function
PHP Version: 5.6.4 OS: Windows
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: mattficken@php.net
New email:
PHP Version: OS:

 

 [2015-01-12 23:18 UTC] mattficken@php.net
Description:
------------

Stack traces of user-mode application crashes on Windows can (with user consent) be reported to Microsoft (see Windows Error Reporting and Watson). This bug is based on one of those reports.

Reported for 5.6.2 php-cgi NTS x86. Likely repros on newer builds.

Watson #73587777330   


Actual result:
--------------
00ccd760 5289b9eb php5!_efree+0x69 [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_alloc.c @ 2440]
00ccd7a8 5289b28b php5!php_verror+0x1bb [c:\php-sdk\php56\vc11\x86\php-5.6.2\main\main.c @ 944]
00ccd7c0 52bb3907 php5!php_error_docref0+0x1b [c:\php-sdk\php56\vc11\x86\php-5.6.2\main\main.c @ 958]
00cce83c 52bebe49 php5!php_message_handler_for_zend+0x147 [c:\php-sdk\php56\vc11\x86\php-5.6.2\main\main.c @ 1472]
00cce89c 5289c49c php5!ZEND_INCLUDE_OR_EVAL_SPEC_TMP_HANDLER+0x33a439 [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 8338]
00cce8ac 528a421c php5!ZEND_CONCAT_SPEC_VAR_CONST_HANDLER+0x4c [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 14338]
00cce8e4 528c1cc4 php5!execute_ex+0x6c [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 363]
00cce994 529e038f php5!zend_call_function+0x3c4 [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_execute_api.c @ 832]
00cce9dc 528a4c82 php5!zif_call_user_func+0x4f [c:\php-sdk\php56\vc11\x86\php-5.6.2\ext\standard\basic_functions.c @ 4751]
00ccea30 528a4453 php5!zend_do_fcall_common_helper_SPEC+0x122 [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 558]
00ccea68 528820ae php5!execute_ex+0x2a3 [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 363]
00ccea8c 528834be php5!zend_execute+0x14e [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend_vm_execute.h @ 388]
00cceac0 528836cc php5!zend_execute_scripts+0xde [c:\php-sdk\php56\vc11\x86\php-5.6.2\zend\zend.c @ 1344]
00ccecec 5289d5f2 php5!php_execute_script+0x14c [c:\php-sdk\php56\vc11\x86\php-5.6.2\main\main.c @ 2584]
00ccf574 00000000 php5!xbuf_format_converter+0x172 [c:\php-sdk\php56\vc11\x86\php-5.6.2\main\spprintf.c @ 777]


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2020-12-23 12:23 UTC] cmb@php.net
Is this still an issue with any of the actively supported PHP
versions[1]?

[1] <https://www.php.net/supported-versions.php>
 [2020-12-23 12:23 UTC] cmb@php.net
-Status: Open +Status: Feedback -Assigned To: +Assigned To: cmb
 [2021-01-03 04:22 UTC] php-bugs at lists dot php dot net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Re-Opened". Thank you.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sun Dec 22 11:01:30 2024 UTC