php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #37992 several invalid writes in ext/gd/tests/bug24594.phpt reported by valgrind
Submitted: 2006-07-02 21:52 UTC Modified: 2006-10-16 15:06 UTC
Votes:1
Avg. Score:1.0 ± 0.0
Reproduced:0 of 0 (0.0%)
From: tony2001@php.net Assigned: pajoye (profile)
Status: Closed Package: GD related
PHP Version: 5CVS-2006-07-02 (CVS) OS: Linux 32bit
Private report: No CVE-ID: None
 [2006-07-02 21:52 UTC] tony2001@php.net
Description:
------------
See http://gcov.php.net/PHP_5_2/tests/ext/gd/tests/bug24594.mem

==12492== Invalid read of size 4
==12492==    at 0x81F4BF0: php_gd__gdImageFillTiled (gd.c:2001)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)
==12492==  Address 0x4FD298C is 0 bytes after a block of size 612 alloc'd
==12492==    at 0x401B65A: malloc (vg_replace_malloc.c:149)
==12492==    by 0x86B0BC9: _emalloc (zend_alloc.c:182)
==12492==    by 0x86B11E3: _ecalloc (zend_alloc.c:320)
==12492==    by 0x81F478A: php_gd__gdImageFillTiled (gd.c:1967)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)
==12492== 
==12492== Invalid read of size 4
==12492==    at 0x81F4C5D: php_gd__gdImageFillTiled (gd.c:2002)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)
==12492==  Address 0x4FD298C is 0 bytes after a block of size 612 alloc'd
==12492==    at 0x401B65A: malloc (vg_replace_malloc.c:149)
==12492==    by 0x86B0BC9: _emalloc (zend_alloc.c:182)
==12492==    by 0x86B11E3: _ecalloc (zend_alloc.c:320)
==12492==    by 0x81F478A: php_gd__gdImageFillTiled (gd.c:1967)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)
==12492== 
==12492== Invalid write of size 4
==12492==    at 0x81F4CD9: php_gd__gdImageFillTiled (gd.c:2007)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)
==12492==  Address 0x4FD298C is 0 bytes after a block of size 612 alloc'd
==12492==    at 0x401B65A: malloc (vg_replace_malloc.c:149)
==12492==    by 0x86B0BC9: _emalloc (zend_alloc.c:182)
==12492==    by 0x86B11E3: _ecalloc (zend_alloc.c:320)
==12492==    by 0x81F478A: php_gd__gdImageFillTiled (gd.c:1967)
==12492==    by 0x81F3FC8: php_gd_gdImageFill (gd.c:1892)
==12492==    by 0x81E5E39: zif_imagefill (gd.c:3376)
==12492==    by 0x8710D47: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200)
==12492==    by 0x8715D49: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1642)
==12492==    by 0x8710736: execute (zend_vm_execute.h:92)
==12492==    by 0x86DCF66: zend_execute_scripts (zend.c:1110)
==12492==    by 0x8665D89: php_execute_script (main.c:1748)
==12492==    by 0x879B23C: main (php_cli.c:1097)

Reproduce code:
---------------
http://gcov.php.net/PHP_5_2/tests/ext/gd/tests/bug24594.phpt.phps

Expected result:
----------------
.

Actual result:
--------------
.

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2006-10-16 15:06 UTC] iliaa@php.net
This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.


 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Apr 27 19:01:29 2024 UTC