php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #25190 Segmentation fault
Submitted: 2003-08-21 09:28 UTC Modified: 2003-08-21 11:13 UTC
From: gabor at netway dot hu Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 4.3.3RC4 OS: Debian Linux
Private report: No CVE-ID: None
 [2003-08-21 09:28 UTC] gabor at netway dot hu
Description:
------------
apache crash, and no more request. 

Reproduce code:
---------------
include("head.php");

OVS_Z050($_SESSION["ovs_session"]);
sleep(5);
session_destroy();
?>


Expected result:
----------------
[Mon Aug 18 08:24:55 2003] [notice] Apache/1.3.26 Ben-SSL/1.48 (Unix) Debian GNU/Linux PHP/4.3.3RC4-dev configured -- resuming normal operations
[Mon Aug 18 08:24:55 2003] [notice] suEXEC mechanism enabled (wrapper: /usr/lib/apache-ssl/suexec)
[Mon Aug 18 08:24:55 2003] [notice] Accept mutex: sysvsem (Default: sysvsem)
[Mon Aug 18 10:48:18 2003] [notice] child pid 344 exit signal Segmentation fault (11)
[Mon Aug 18 10:48:54 2003] [notice] child pid 341 exit signal Segmentation fault (11)
[Mon Aug 18 10:49:37 2003] [notice] child pid 366 exit signal Segmentation fault (11)
/usr/src/php4-STABLE-200308080930/Zend/zend_execute.c(1611) :  Freeing 0x08151FAC (12 bytes), script=/var/www/ovs/ovs.members/php/Z050.php
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(295) :  Freeing 0x0814CE14 (14520 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(4619) :  Freeing 0x08151EF4 (11 bytes), script=/var/www/xx.php
Last leak repeated 118 times
Zend/zend_language_scanner.c(4484) :  Freeing 0x08151EB4 (9 bytes), script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(4492) :  Freeing 0x08151D2C (20 bytes), script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(3072) :  Freeing 0x0814AA24 (84 bytes), script=/var/www/xx.php
Last leak repeated 2 times
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(65) :  Freeing 0x0814B5A4 (4 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(3911) :  Freeing 0x0814B564 (16 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 5 times
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(854) :  Freeing 0x0814B474 (13 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
Last leak repeated 1 time
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(230) :  Freeing 0x081464D4 (12 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1761) :  Freeing 0x08145E84 (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1745) :  Freeing 0x08145D2C (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(2025) :  Freeing 0x0814597C (8 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
Last leak repeated 5 times
Zend/zend_language_scanner.c(4399) :  Freeing 0x0814617C (3 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 1 time
Zend/zend_language_scanner.c(4710) :  Freeing 0x081410AC (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
[Mon Aug 18 10:50:32 2003] [notice] child pid 342 exit signal Segmentation fault (11)
[Mon Aug 18 10:51:52 2003] [notice] child pid 340 exit signal Segmentation fault (11)
[Mon Aug 18 10:53:22 2003] [notice] child pid 339 exit signal Segmentation fault (11)
[Mon Aug 18 14:03:12 2003] [notice] child pid 472 exit signal Segmentation fault (11)
[Mon Aug 18 14:11:22 2003] [notice] child pid 433 exit signal Segmentation fault (11)
[Mon Aug 18 14:12:32 2003] [notice] child pid 338 exit signal Segmentation fault (11)
[Mon Aug 18 14:13:23 2003] [notice] child pid 434 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:11 2003] [notice] child pid 473 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:30 2003] [notice] child pid 443 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:57 2003] [notice] child pid 474 exit signal Segmentation fault (11)



Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2003-08-21 10:47 UTC] jay@php.net
Is this caused by some sort of third-party application? 
What is OVS? Do you have a self-contained example that can 
actually be reproduced? What does the function OVS_Z050() 
do? 
 
Unless you can answer these questions, this is likely 
bogus. 
 
J 
 [2003-08-21 10:58 UTC] gabor at netway dot hu
the code is:

  function OVS_Z050($ORA_SESS_ID){  
   global $conn;
   $Z050_query="
                BEGIN
		     msie_logout_session_proc (:sessid,:ipaddr,:result_rc);
                END;
                 ";
    $stmt = $conn->PrepareSP($Z050_query);
    $conn->Parameter($stmt,$ORA_SESS_ID,"sessid",27);
    $conn->Parameter($stmt,getenv("REMOTE_ADDR"),"ipaddr",15);
    $conn->Parameter($stmt,$rc, "result_rc",12);
    $conn->Execute($stmt);
    if ($rc==500)
     $msg = 'Logoff succeeded';
    else {
     $msg="ERROR(".$rc."): ";
     if ($rc==(-501)){
      $msg.="Logoff ok, but session timed out!";
      echo "<script>
              alert('".$msg."');	      
            </script> 
           ";      
      
     }
     if ($rc==(-550)){
      $msg.="LOGGING ERROR!";      
      echo "<script>
             alert('".$msg."');	      
            </script> 
           ";      
 
     }
    }       
     return $msg; 		 
  }
 [2003-08-21 11:05 UTC] gabor at netway dot hu
Thank you :-).
 [2003-08-21 11:13 UTC] jay@php.net
So by the looks of it, this is using ADOdb, which means 
this is a third-party application and isn't necessarily a 
PHP problem. You'll have to contact the ADOdb developers 
and see what they say. 
 
I don't know what OVS, but if it's another third-party 
application, contact them as well.  
 
J 
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Oct 05 04:01:29 2024 UTC