php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #58099 double free of zval
Submitted: 2008-03-12 22:48 UTC Modified: 2013-07-16 06:18 UTC
From: xuefer at gmail dot com Assigned:
Status: Wont fix Package: event (PECL)
PHP Version: 5.2.1 OS: linux
Private report: No CVE-ID: None
Have you experienced this issue?
Rate the importance of this bug to you:

 [2008-03-12 22:48 UTC] xuefer at gmail dot com
Description:
------------
output from valgrind

==16985== Invalid read of size 4
==16985==    at 0x82AEA2C: _zval_ptr_dtor (in /usr/bin/php5)
==16985==    by 0x402BD59: callback_to_php (event.c:803)
==16985==    by 0x402C3B2: zif_event_dispatch (event.c:648)
==16985==    by 0x82EC7BA: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82EC13A: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82BC092: zend_execute_scripts (in /usr/bin/php5)
==16985==    by 0x8273352: php_execute_script (in /usr/bin/php5)
==16985==    by 0x834D83E: main (in /usr/bin/php5)
==16985==  Address 0x4a8ede8 is 8 bytes inside a block of size 16 free'd
==16985==    at 0x402465C: free (vg_replace_malloc.c:323)
==16985==    by 0x829FB82: _efree (in /usr/bin/php5)
==16985==    by 0x82AEA51: _zval_ptr_dtor (in /usr/bin/php5)
==16985==    by 0x402BD4E: callback_to_php (event.c:801)
==16985==    by 0x402C3B2: zif_event_dispatch (event.c:648)
==16985==    by 0x82EC7BA: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82EC13A: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82BC092: zend_execute_scripts (in /usr/bin/php5)
==16985==    by 0x8273352: php_execute_script (in /usr/bin/php5)
==16985==    by 0x834D83E: main (in /usr/bin/php5)


==16985== Invalid read of size 4
==16985==    at 0x82AEA32: _zval_ptr_dtor (in /usr/bin/php5)
==16985==    by 0x402BD59: callback_to_php (event.c:803)
==16985==    by 0x402C3B2: zif_event_dispatch (event.c:648)
==16985==    by 0x82EC7BA: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82EC13A: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82BC092: zend_execute_scripts (in /usr/bin/php5)
==16985==    by 0x8273352: php_execute_script (in /usr/bin/php5)
==16985==    by 0x834D83E: main (in /usr/bin/php5)
==16985==  Address 0x4a8ede8 is 8 bytes inside a block of size 16 free'd
==16985==    at 0x402465C: free (vg_replace_malloc.c:323)
==16985==    by 0x829FB82: _efree (in /usr/bin/php5)
==16985==    by 0x82AEA51: _zval_ptr_dtor (in /usr/bin/php5)
==16985==    by 0x402BD4E: callback_to_php (event.c:801)
==16985==    by 0x402C3B2: zif_event_dispatch (event.c:648)
==16985==    by 0x82EC7BA: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82EC13A: (within /usr/bin/php5)
==16985==    by 0x82DD1BE: execute (in /usr/bin/php5)
==16985==    by 0x82BC092: zend_execute_scripts (in /usr/bin/php5)
==16985==    by 0x8273352: php_execute_script (in /usr/bin/php5)
==16985==    by 0x834D83E: main (in /usr/bin/php5)



Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2013-07-16 06:18 UTC] osmanov@php.net
-Status: Open +Status: Wont fix
 [2013-07-16 06:18 UTC] osmanov@php.net
Thank you for taking the time to report a problem with PHP.
Unfortunately you are not using a current version of PHP -- 
the problem might already be fixed. Please download a new
PHP version from http://www.php.net/downloads.php

If you are able to reproduce the bug with one of the latest
versions of PHP, please change the PHP version on this bug report
to the version you tested and change the status back to "Open".
Again, thank you for your continued support of PHP.


 
PHP Copyright © 2001-2020 The PHP Group
All rights reserved.
Last updated: Sun Jan 26 20:01:25 2020 UTC