php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #78422 openssl_random_pseudo_bytes() -> Segmentation fault
Submitted: 2019-08-16 13:45 UTC Modified: 2019-08-16 14:10 UTC
From: thomas-php at digionline dot de Assigned:
Status: Duplicate Package: OpenSSL related
PHP Version: 7.4.0beta2 OS: Debian 10
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: thomas-php at digionline dot de
New email:
PHP Version: OS:

 

 [2019-08-16 13:45 UTC] thomas-php at digionline dot de
Description:
------------
openssl_random_pseudo_bytes() crashes PHP, when second parameter &$crypto_strong is given.

Test script:
---------------
<?
openssl_random_pseudo_bytes(4,$b);
?>


Expected result:
----------------
nothing.

Actual result:
--------------
Segmentation fault


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2019-08-16 14:06 UTC] requinix@php.net
-Status: Open +Status: Analyzed
 [2019-08-16 14:06 UTC] requinix@php.net
> Assertion `(zval_get_type(&(*(zstrong_result_returned))) == 10)' failed.
 [2019-08-16 14:10 UTC] nikic@php.net
-Status: Analyzed +Status: Duplicate
 [2019-08-16 14:10 UTC] nikic@php.net
Duplicate of bug #78391, which is fixed in beta3.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu Nov 21 16:01:29 2024 UTC