Edit report at http://bugs.php.net/bug.php?id=51008&edit=1
ID: 51008 Updated by: dmi...@php.net Reported by: geissert at debian dot org Summary: Zend/tests/bug45877.phpt fails -Status: Assigned +Status: Closed Type: Bug Package: Scripting Engine problem Operating System: debian sid PHP Version: 5.3SVN-2010-02-12 Assigned To: dmitry Block user comment: N New Comment: This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. Previous Comments: ------------------------------------------------------------------------ [2010-10-05 13:28:59] dmi...@php.net Automatic comment from SVN on behalf of dmitry Revision: http://svn.php.net/viewvc/?view=revision&revision=304083 Log: Fixed bug #51008 (Zend/tests/bug45877.phpt fails) ------------------------------------------------------------------------ [2010-09-29 17:54:22] cataphr...@php.net See also http://bugs.gentoo.org/show_bug.cgi?id=338280 and http://bugs.php.net/bug.php?id=52899 The current implementation relies on undefined behavior and apparently the overflow check can be optimized away. ------------------------------------------------------------------------ [2010-03-06 20:02:57] geiss...@php.net Reopening it because somebody with commit access to the engine needs to apply and commit the patch there. The other patch can be found at http://git.debian.org/?p=pkg-php/php.git;a=blob;f=debian/patches/zend_int_overflow.patch;hb=0fe497525d46b2fa8353e37106b47c05ef804cc5 ------------------------------------------------------------------------ [2010-02-23 13:05:16] j...@php.net Duplicate. ------------------------------------------------------------------------ [2010-02-22 23:47:30] geiss...@php.net Indeed. I just checked with the -O0 build and it passes. The affected code in this case is ZEND_HANDLE_NUMERIC in Zend/zend_hash.h Should this one be assigned to somebody in particular? ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/bug.php?id=51008 -- Edit this bug report at http://bugs.php.net/bug.php?id=51008&edit=1