ID: 31214 Updated by: php-bugs@lists.php.net Reported By: ebypdx at comcast dot net -Status: Feedback +Status: No Feedback Bug Type: Class/Object related Operating System: Solaris 5.8 PHP Version: 4.3.10 New Comment:
No feedback was provided for this bug for over a week, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open". Previous Comments: ------------------------------------------------------------------------ [2004-12-21 18:05:49] [EMAIL PROTECTED] leave bug @ feedback until further information is known. ------------------------------------------------------------------------ [2004-12-21 17:33:51] ebypdx at comcast dot net thanks very much for the feedback, if our sysadmins have time to apply that patch i'll post back the results. for now we've rolled back a version. ------------------------------------------------------------------------ [2004-12-21 03:58:03] [EMAIL PROTECTED] Try the patch listed in bug report #31106 ------------------------------------------------------------------------ [2004-12-21 03:04:38] [EMAIL PROTECTED] in Zend/zend_execute.c about line 997: remove this line PZVAL_UNLOCK(T->EA.data.overloaded_element.object); about line 1579: remove this line EX(object).ptr->refcount++; you have to copy & paste the whole link for it to work / rather than just pressing on it. ------------------------------------------------------------------------ [2004-12-21 02:45:16] ebypdx at comcast dot net i believe we aren't using any of those extensions. i will double-check with the sysadmin team. can you give me a tip on how to revert that change? when i follow the link to cvsweb from report 31106 i get a "malformed query" page. ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/31214 -- Edit this bug report at http://bugs.php.net/?id=31214&edit=1