php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #78422 openssl_random_pseudo_bytes() -> Segmentation fault
Submitted: 2019-08-16 13:45 UTC Modified: 2019-08-16 14:10 UTC
From: thomas-php at digionline dot de Assigned:
Status: Duplicate Package: OpenSSL related
PHP Version: 7.4.0beta2 OS: Debian 10
Private report: No CVE-ID: None
 [2019-08-16 13:45 UTC] thomas-php at digionline dot de
Description:
------------
openssl_random_pseudo_bytes() crashes PHP, when second parameter &$crypto_strong is given.

Test script:
---------------
<?
openssl_random_pseudo_bytes(4,$b);
?>


Expected result:
----------------
nothing.

Actual result:
--------------
Segmentation fault


Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2019-08-16 14:06 UTC] requinix@php.net
-Status: Open +Status: Analyzed
 [2019-08-16 14:06 UTC] requinix@php.net
> Assertion `(zval_get_type(&(*(zstrong_result_returned))) == 10)' failed.
 [2019-08-16 14:10 UTC] nikic@php.net
-Status: Analyzed +Status: Duplicate
 [2019-08-16 14:10 UTC] nikic@php.net
Duplicate of bug #78391, which is fixed in beta3.
 
PHP Copyright © 2001-2019 The PHP Group
All rights reserved.
Last updated: Thu Dec 05 15:01:24 2019 UTC