|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #2883 Leak & Mem-Overwrite in libzend (with testcase)
Submitted: 1999-12-01 08:18 UTC Modified: 1999-12-01 09:55 UTC
From: thies at digicol dot de Assigned:
Status: Closed Package: Scripting Engine problem
PHP Version: 4.0 Latest CVS (01/12/1999) OS: all
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Bug Type:
From: thies at digicol dot de
New email:
PHP Version: OS:


 [1999-12-01 08:18 UTC] thies at digicol dot de
$qparams = array("andi");
isset($qparams[ 0 ][ "zeev" ]);
[Wed Dec  1 14:16:47 1999]  Script:  '../crash/index.php'
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_execute_API.c(207) : Block 0x001B8F28 status:
Beginning:      Overrun (magic=0x00000046, expected=0x7312F8DC)
      End:      Unknown
[Wed Dec  1 14:16:47 1999]  Script:  '../crash/index.php'
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_opcode.c(165) : Block 0x001BE950 status:
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_variables.c(62) : Actual location (location was relayed)
Beginning:      Cached (allocated on /dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend-scanner.l:1227, 5 bytes)
      End:      OK
/dot/dc4/zend/php-dev/php4_cgi_debug/../php4/libzend/zend_execute.c(692) :  Freeing 0x001BFE60 <> (16 bytes), script=../crash/index.php
Last leak repeated 1 time


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [1999-12-01 09:55 UTC] andi at cvs dot php dot net
Fixed in latest CVS!
PHP Copyright © 2001-2021 The PHP Group
All rights reserved.
Last updated: Tue Jan 19 11:01:22 2021 UTC