php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #2883 Leak & Mem-Overwrite in libzend (with testcase)
Submitted: 1999-12-01 08:18 UTC Modified: 1999-12-01 09:55 UTC
From: thies at digicol dot de Assigned:
Status: Closed Package: Scripting Engine problem
PHP Version: 4.0 Latest CVS (01/12/1999) OS: all
Private report: No CVE-ID: None
 [1999-12-01 08:18 UTC] thies at digicol dot de
<?
$qparams = array("andi");
isset($qparams[ 0 ][ "zeev" ]);
?>
[Wed Dec  1 14:16:47 1999]  Script:  '../crash/index.php'
---------------------------------------
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_execute_API.c(207) : Block 0x001B8F28 status:
Beginning:      Overrun (magic=0x00000046, expected=0x7312F8DC)
      End:      Unknown
---------------------------------------
[Wed Dec  1 14:16:47 1999]  Script:  '../crash/index.php'
---------------------------------------
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_opcode.c(165) : Block 0x001BE950 status:
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_variables.c(62) : Actual location (location was relayed)
Beginning:      Cached (allocated on /dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend-scanner.l:1227, 5 bytes)
      End:      OK
---------------------------------------
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_execute.c(692) :  Freeing 0x001BFE60 <> (16 bytes), script=../crash/index.php
Last leak repeated 1 time


Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1999-12-01 09:55 UTC] andi at cvs dot php dot net
Fixed in latest CVS!
 
PHP Copyright © 2001-2017 The PHP Group
All rights reserved.
Last updated: Sun Nov 19 01:31:42 2017 UTC