ID:               40624
 User updated by:  test_junk at hotmail dot it
 Reported By:      test_junk at hotmail dot it
-Status:           Feedback
+Status:           Open
 Bug Type:         PCRE related
 Operating System: linux 2.4 i386
 PHP Version:      4.4.5
 New Comment:

Is this issue going to be fixed in the next release? Unfortunately it
breaks lots of things, including very popular apps. I will try to do my
best in finding the responsible php code but I'm not sure it will be
possibile.
Thanks for your interest in this matter.


Previous Comments:
------------------------------------------------------------------------

[2007-02-28 00:13:38] [EMAIL PROTECTED]

Yup, it does look like a stack overflow (which is a known issue in
PCRE), though we would appreciate a test case anyway.

------------------------------------------------------------------------

[2007-02-27 23:39:19] test_junk at hotmail dot it

I couldn't isolate the code yet. However the full backtrace is the
following (I ran the same app twice):

1st time:

#0  0x081851f2 in match (eptr=0x61737361 <Address 0x61737361 out of
bounds>,
    ecode=0x2c69746c <Address 0x2c69746c out of bounds>,
offset_top=1919250464, md=0x7474656d,
    ims=1868852837, eptrb=0x736f6320, flags=1629531331,
rdepth=1702192160)
    at /sources/php/php-4.4.6/ext/pcre/pcrelib/pcre_exec.c:2209
#1  0x00000000 in ?? () 


2nd time:

#0  0x0818257f in match (eptr=0x61737361 <Address 0x61737361 out of
bounds>,
    ecode=0x2c69746c <Address 0x2c69746c out of bounds>,
offset_top=1919250464, md=0x7474656d,
    ims=1868852837, eptrb=0x736f6320, flags=1629531331,
rdepth=1702192160)
    at /sources/php/php-4.4.6/ext/pcre/pcrelib/pcre_exec.c:1071
Cannot access memory at address 0xbf7ffff0

------------------------------------------------------------------------

[2007-02-26 14:00:30] [EMAIL PROTECTED]

also please post the whole backtrace, so that we can see what's
happening (it may be just a stack overflow..)

------------------------------------------------------------------------

[2007-02-26 08:58:27] [EMAIL PROTECTED]

Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.



------------------------------------------------------------------------

[2007-02-26 00:24:41] test_junk at hotmail dot it

This snapshot is identical to the one I tested as far as I am seeing
comparing the 2 archives, however which files did you modify?

The only way I have to trigger this bug is recompiling the engine on a
production server but since it breaks several websites (Drupal seems to
be most affected) I can do it only at night so I can perform a limited
number of attempts.

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/40624

-- 
Edit this bug report at http://bugs.php.net/?id=40624&edit=1

Reply via email to