php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #55190 variant_add crash when two null parameters
Submitted: 2011-07-12 12:42 UTC Modified: 2015-04-07 18:01 UTC
From: jinmoku at hotmail dot com Assigned: cmb (profile)
Status: Closed Package: COM related
PHP Version: 5.3.6 OS: Win 7
Private report: No CVE-ID: None
View Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
If you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: jinmoku at hotmail dot com
New email:
PHP Version: OS:

 

 [2011-07-12 12:42 UTC] jinmoku at hotmail dot com
Description:
------------
variant_add crash when two null parameters

Test script:
---------------
variant_add(null, null);

Expected result:
----------------
crash

Actual result:
--------------
a warning

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2011-07-12 12:57 UTC] jinmoku at hotmail dot com
I think that touch many variant_* func
 [2011-07-12 18:01 UTC] felipe@php.net
-Status: Open +Status: Feedback
 [2011-07-12 18:01 UTC] felipe@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php for *NIX and
http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PHP better.


 [2011-07-13 08:37 UTC] jinmoku at hotmail dot com
-Status: Feedback +Status: Open
 [2011-07-13 08:37 UTC] jinmoku at hotmail dot com
Thread 0 - System ID 696
Entry point   php!mainCRTStartup 
Create time   13/07/2011 14:34:04 
Time spent in user mode   0 Days 0:0:0.795 
Time spent in kernel mode   0 Days 0:0:0.140 






Function     Arg 1     Arg 2     Arg 3   Source 
php5ts!php_com_variant_from_zval+6     009cf98c     00000000     00000000    
php5ts!zif_variant_set+203     00000000     02b2f9a8     02b60080    
php5ts!zif_variant_add+15     00000002     02b2f9a8     00000000    
php5ts!execute+1110     02b60080     012a1b00     012a1b80    
php5ts!execute+583a     012a1b80     009cfa9c     00000000    
php5ts!execute+2e8     02b2f450     012a1b00     012a1b80    
php5ts!zend_execute_scripts+fe     00000008     012a1b80     00000000    
php5ts!php_execute_script+24c     009cfd4c     012a1b80     0133642c    
php!main+b5b     00000002     012a1b10     012a1ef8    
php!memcpy+160     7efde000     009cfe8c     777f9ed2    
kernel32!BaseThreadInitThunk+e     7efde000     77c5e177     00000000    
ntdll!__RtlUserThreadStart+70     01332fa2     7efde000     00000000    
ntdll!_RtlUserThreadStart+1b     01332fa2     7efde000     00000000    




PHP5TS!PHP_COM_VARIANT_FROM_ZVAL+6In php__PID__2848__Date__07_13_2011__Time_02_34_37PM__7__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5ts!php_com_variant_from_zval+6 in C:\Program Files (x86)\PHP\php5ts.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x0000000c on thread 0
 [2015-04-07 18:01 UTC] cmb@php.net
-Status: Open +Status: Closed -Assigned To: +Assigned To: cmb
 [2015-04-07 18:01 UTC] cmb@php.net
Thank you for your bug report. This issue has already been fixed
in the latest released version of PHP, which you can download at 
http://www.php.net/downloads.php


 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Fri Dec 06 01:01:29 2024 UTC