Edit report at http://bugs.php.net/bug.php?id=51008&edit=1

 ID:                 51008
 Updated by:         dmi...@php.net
 Reported by:        geissert at debian dot org
 Summary:            Zend/tests/bug45877.phpt fails
-Status:             Assigned
+Status:             Closed
 Type:               Bug
 Package:            Scripting Engine problem
 Operating System:   debian sid
 PHP Version:        5.3SVN-2010-02-12
 Assigned To:        dmitry
 Block user comment: N

 New Comment:

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.




Previous Comments:
------------------------------------------------------------------------
[2010-10-05 13:28:59] dmi...@php.net

Automatic comment from SVN on behalf of dmitry
Revision: http://svn.php.net/viewvc/?view=revision&revision=304083
Log: Fixed bug #51008 (Zend/tests/bug45877.phpt fails)

------------------------------------------------------------------------
[2010-09-29 17:54:22] cataphr...@php.net

See also http://bugs.gentoo.org/show_bug.cgi?id=338280 and
http://bugs.php.net/bug.php?id=52899



The current implementation relies on undefined behavior and apparently
the overflow check can be optimized away.

------------------------------------------------------------------------
[2010-03-06 20:02:57] geiss...@php.net

Reopening it because somebody with commit access to the engine needs to
apply and commit the patch there. The other patch can be found at

http://git.debian.org/?p=pkg-php/php.git;a=blob;f=debian/patches/zend_int_overflow.patch;hb=0fe497525d46b2fa8353e37106b47c05ef804cc5

------------------------------------------------------------------------
[2010-02-23 13:05:16] j...@php.net

Duplicate.

------------------------------------------------------------------------
[2010-02-22 23:47:30] geiss...@php.net

Indeed. I just checked with the -O0 build and it passes.



The affected code in this case is ZEND_HANDLE_NUMERIC in
Zend/zend_hash.h



Should this one be assigned to somebody in particular?

------------------------------------------------------------------------


The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

    http://bugs.php.net/bug.php?id=51008


-- 
Edit this bug report at http://bugs.php.net/bug.php?id=51008&edit=1

Reply via email to