#29687 [Opn->Fbk]: By-reference passed value inside foreach() is no longer working
ID: 29687 Updated by: [EMAIL PROTECTED] Reported By: jakub dot phpbug at horky dot net -Status: Open +Status: Feedback Bug Type: Scripting Engine problem Operating System: * PHP Version: 6CVS-2006-04-28 (snap) New Comment: Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi Previous Comments: [2006-04-28 19:21:51] jakub dot phpbug at horky dot net (Also note that unlike bug #28939, there are _referenced_ arrays in question.) [2006-04-28 19:10:44] jakub dot phpbug at horky dot net Please review the bug. It ISN'T bogus indeed, although it appears so. The code snippet provided proves that the behavior is really incorrect. Admit that when you only "touch" the array (by read-only function such as key()), you lose your reference-passing? More, you don't lose it in current cycle but in the NEXT cycle and subsequent? Hmm... I tested it on today's snap and still the same behavior. I'm really looking forward to the moment when I can remove the workaround from all reference-passed foreachs from all of my projects... thanks. [2005-06-19 02:00:07] [EMAIL PROTECTED] See bug #28939 [2004-08-15 15:19:47] jakub dot phpbug at horky dot net Description: A value passed inside foreach() costruct by reference does not reflect the changes made to that value when the iterated array is touched by some array function, like key() or current(). In example below, if you comment out the key() line, it will work OK. I think that this bug is closely related to the bug #28939. Reproduce code: --- &$item) { key($array); // there may be also current(), reset(), // first(), next(), prev(), foreach etc. $item = "YES"; var_dump($item); } print_r($array); ?> Expected result: string(3) "YES" string(3) "YES" string(3) "YES" Array ( [0] => YES [1] => YES [2] => YES ) Actual result: -- string(3) "YES" string(3) "YES" string(3) "YES" Array ( [0] => YES [1] => NO [2] => NO ) -- Edit this bug report at http://bugs.php.net/?id=29687&edit=1
#39710 [Opn->Fbk]: getprotobyname is not thread-safe
ID: 39710 Updated by: [EMAIL PROTECTED] Reported By: [EMAIL PROTECTED] -Status: Open +Status: Feedback -Bug Type:Unknown/Other Function +Bug Type:Network related PHP Version: 6CVS-2006-12-01 (CVS) New Comment: And this is only true for PHP 6?! If this applies to PHP 5, adjust the version s/6CVS/5.2CVS/ Previous Comments: [2006-12-01 22:57:42] [EMAIL PROTECTED] Description: The PHP functions: getservbyname getservbyport getprotobyname getprotobynumber are not thread safe. -- Edit this bug report at http://bugs.php.net/?id=39710&edit=1
#42060 [Opn->Fbk]: [PATCH] Add pagedResults support and more (PAT18 and PAT19 updated for 5.2.3)
ID: 42060 Updated by: [EMAIL PROTECTED] Reported By: iarenuno at eteo dot mondragon dot edu -Status: Open +Status: Feedback Bug Type: LDAP related Operating System: Any PHP Version: 5.2.3 Assigned To: jani New Comment: Ok, but let's keep this in "Feedback" status until that then. Previous Comments: [2007-07-26 13:47:12] iarenuno at eteo dot mondragon dot edu I'll have a look at the issues you mention and will be back in a couple of days. Saludos. Iñaki. [2007-07-24 15:02:00] [EMAIL PROTECTED] Some comments about the patch: 1) you need to make the patch apply to latest PHP _5_2 checkout instead of 5.2.3 sources. (I made some changes in there before I saw this report) 2) Do you really need to add so many functions for this stuff? And the naming of those functions isn't very intuitive either. 3) Separate the fixes from the new features. (first fix stuff then add new..) [2007-07-21 16:08:17] [EMAIL PROTECTED] New features are not added in bugfix releases so this'll have to wait til we start the 5.3 branch. [2007-07-21 15:52:48] iarenuno at eteo dot mondragon dot edu Description: I've taken Pierangelo Masarati's patches (PAT18 and PAT19) and have updated them to apply to 5.2.3 cleanly (as of today) and fixed a memory leak. In addition to it, I've added 4 test scripts based on the examples from Pierangelo, with a few modifications by me. I have tested this patch by building PHP with OpenLDAP 2.2.23 libraries (under Debian Sarge) and run the test scripts against both OpenLDAP 2.2.23 slapd server and MS Active Directory (runnning under W2K3 in W2K3 functional mode). OpenLDAP passes all the tests except passwordPolicy control extension (because it doesn't support it) and MS Active Directory passes only the pagedResult test (because it doesn't support the rest of the implemented controls for which tests exist). The patch is available at: http://www.eteo.mondragon.edu/descargas/php-ldap/php-ext-ldap-5.2.3.diff.txt.gz Could you please add this to the next stable PHP release? I badly need pagedResults control extension support in PHP :-) Saludos. Iñaki. -- Edit this bug report at http://bugs.php.net/?id=42060&edit=1
#42079 [Com]: pdo_mysql always links to 3.x libraries
ID: 42079 Comment by: kings_wolf at gmx dot de Reported By: mjsabby at gmail dot com Status: Open Bug Type: PDO related Operating System: Linux PHP Version: 6CVS-2007-07-23 (CVS) New Comment: Not working for me also Previous Comments: [2007-07-23 11:30:16] mjsabby at gmail dot com Description: In PHP6 CVS, the PDO driver for MySQL always uses the MySQL 3.x client API version, according to phpinfo() >From what it looks like, phpinfo() is telling the truth here, a connect to the DB failed because of password incompatibility, probably suggesting the client API is 3.x However, I could very well be wrong, and it may just be a phpinfo() output error. I've compiled 5.2.3 with the same config line (plus/minus ICU) and that works as desired. PHP 6 config line: './configure' '--with-apxs2=/usr/local/apache2/bin/apxs' / '--with-mysql=/usr/local/mysql' / '--with-mysqli=/usr/local/mysql/bin/mysql_config' / '--with-pdo-mysql=/usr/local/mysql' --with-icu-dir='/home/mukul/icu' PHP 5.2.3 config line: './configure' '--with-apxs2=/usr/local/apache2/bin/apxs' / '--with-mysql=/usr/local/mysql' / '--with-mysqli=/usr/local/mysql/bin/mysql_config' / '--with-pdo-mysql=/usr/local/mysql' PHP 5.2.3 screen: http://mjsabby.com/pdo523.jpg PHP CVS6 screen: http://mjsabby.com/phpcvs6.jpg Expected result: PHP 6 should (or if it's a phpinfo() error, then display) the correct MySQL client API that the PDO has been enabled with. -- Edit this bug report at http://bugs.php.net/?id=42079&edit=1
#42094 [Bgs]: getenv("REMOTE_ADDR") returns no IP address
ID: 42094 User updated by: fushimi at rep dot fielding dot nec dot co dot jp Reported By: fushimi at rep dot fielding dot nec dot co dot jp Status: Bogus Bug Type: Apache2 related Operating System: Windows 2000 PHP Version: 5.2.3 New Comment: Thank you again for your help. Could you give me any idea about how can I enable this option in Apache2? Previous Comments: [2007-07-26 09:50:13] [EMAIL PROTECTED] It's apache that isn't setting it. PHP only sets the variables to whatever the server says they are. No bug in PHP. [2007-07-26 00:48:12] fushimi at rep dot fielding dot nec dot co dot jp Thank you, to reply me so quickly. Yes, $_SERVER['REMOTE_ADDR'] return the right IP address. One more thing that I forgot to mention, my Http server is Apache version 2.2.4. To help you, below is the results of PHP variable using phpinfo(): PHP5.2.3 and Apache2.2.4 _SERVER["SERVER_ADDR"] 192.168.1.3 _SERVER["SERVER_PORT"] 80 _SERVER["REMOTE_ADDR"] 0.0.0.0 _SERVER["REMOTE_PORT"] 0 PHP5.1.2 and Apache2.0.59 = _SERVER["SERVER_ADDR"] 192.168.1.2 _SERVER["SERVER_PORT"] 80 _SERVER["REMOTE_ADDR"] 192.168.1.1 _SERVER["REMOTE_PORT"] 2476 [2007-07-25 11:58:27] [EMAIL PROTECTED] Does it show up in $_SERVER['REMOTE_ADDR'] ?? [2007-07-25 07:53:25] fushimi at rep dot fielding dot nec dot co dot jp Description: I am evaluating the newest PHP 5.2.3, in relation with my current PHP 5.1.2. So, when I tried to get the remote IP using getenv(REMOTE_ADDR), I obtained the following results: PHP 5.2.3 => return 0.0.0.0 PHP 5.1.2 => return 192.168.1.1 PHP in ISAPI mode. Reproduce code: --- $ip = getenv("REMOTE_ADDR"); echo "IP Address : ".$ip; Expected result: IP Address : 192.168.1.1 Actual result: -- IP Address : 0.0.0.0 -- Edit this bug report at http://bugs.php.net/?id=42094&edit=1
#42118 [Opn->Bgs]: PHP prototyping in methods/functions error with string type.
ID: 42118 Updated by: [EMAIL PROTECTED] Reported By: dinesh at dinsoft dot net -Status: Open +Status: Bogus Bug Type: Scripting Engine problem Operating System: Windows PHP Version: 5.2.3 New Comment: You don't have class called "string" set, do you? There is no type hinting for "string" type in PHP.. Previous Comments: [2007-07-27 00:21:11] dinesh at dinsoft dot net It is actually not restricted to classes and stream_wrapper_register. [2007-07-27 00:15:32] dinesh at dinsoft dot net Description: The error message produced by PHP is a non sense. This should just work. Reproduce code: --- class DSProxy { function stream_open(string $path, string $mode, int $options, string $opened_path) { return false; } ... } stream_wrapper_register('proxy', 'DSProxy') or die("ERROR: Could not register the proxy protocol!\n"); $fp = fopen('proxy://www.dinsoft.net', 'r'); Expected result: I expect it to work, or at least to produce a meaning full error message. Actual result: -- PHP Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an instance of string, string given in E:\dev\flights\proxy.php on line 8 Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an in stance of string, string given in E:\dev\flights\proxy.php on line 8 -- Edit this bug report at http://bugs.php.net/?id=42118&edit=1
#42115 [Opn]: Should not allow static keyword before visibility keyword
ID: 42115 User updated by: mattsch at gmail dot com Reported By: mattsch at gmail dot com Status: Open Bug Type: Class/Object related Operating System: Gentoo Linux PHP Version: 5.2.3 New Comment: I don't argue that php is a loosely typed language but it does have rules and it should either adhere by them or change the rules. Currently the documentation says that static must come after visibility: http://www.php.net/manual/en/language.oop5.static.php "The static declaration must be after the visibility declaration." So either emit an E_STRICT warning or change the documentation to include this syntax as well. Previous Comments: [2007-07-27 02:27:14] judas dot iscariote at gmail dot com No, PHP is a dynamic language, I dont see why this should raise any kind of error 1. does not cause any problem. 2.it is perfectly valid code. [2007-07-26 20:14:20] mattsch at gmail dot com Description: Contrary to the documentation, you're allowed to put the static keyword before the visibility keyword. Shouldn't this throw an E_STRICT warning? Reproduce code: --- Expected result: E_STRICT: You cannot declare static before a visibility keyword. Actual result: -- Echoes "test" without warning. -- Edit this bug report at http://bugs.php.net/?id=42115&edit=1
#42115 [Com]: Should not allow static keyword before visibility keyword
ID: 42115 Comment by: judas dot iscariote at gmail dot com Reported By: mattsch at gmail dot com Status: Open Bug Type: Class/Object related Operating System: Gentoo Linux PHP Version: 5.2.3 New Comment: No, PHP is a dynamic language, I dont see why this should raise any kind of error 1. does not cause any problem. 2.it is perfectly valid code. Previous Comments: [2007-07-26 20:14:20] mattsch at gmail dot com Description: Contrary to the documentation, you're allowed to put the static keyword before the visibility keyword. Shouldn't this throw an E_STRICT warning? Reproduce code: --- Expected result: E_STRICT: You cannot declare static before a visibility keyword. Actual result: -- Echoes "test" without warning. -- Edit this bug report at http://bugs.php.net/?id=42115&edit=1
#42119 [NEW]: array_push($arr,&$obj) doesn't work with zend.ze1_compatibility_mode On
From: rick_g22 at yahoo dot com Operating system: Win32 PHP version: 5.2.3 PHP Bug Type: Scripting Engine problem Bug description: array_push($arr,&$obj) doesn't work with zend.ze1_compatibility_mode On Description: On PHP 5.2.3 (win32 version at least), php.ini disregards "allow_call_time_pass_reference = On" for objects, if "zend.ze1_compatibility_mode = On". This is SPECIFICALLY for uses of array_push WITH ampersand, i.e. array_push($arr,&$obj) - this code worked perfectly in PHP4, and fails in PHP5. Note 1: This bug is the opposite behavior of bug #30332 - #30332's example didn't use an ampersand when passing the objects, and this does. Note 2: A workaround is $arr[] = &$obj; Reproduce code: --- item = 2; echo $arr[0]->item; ?> Expected result: 2 Actual result: -- 1 -- Edit bug report at http://bugs.php.net/?id=42119&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42119&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42119&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42119&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42119&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42119&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42119&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42119&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42119&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42119&r=support Expected behavior:http://bugs.php.net/fix.php?id=42119&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42119&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42119&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42119&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42119&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42119&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42119&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42119&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42119&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42119&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42119&r=mysqlcfg
#42118 [Opn]: PHP prototyping in methods/functions error with string type.
ID: 42118 User updated by: dinesh at dinsoft dot net -Summary: stream_wrapper_register() with function prototyping with types Reported By: dinesh at dinsoft dot net Status: Open Bug Type: Scripting Engine problem Operating System: Windows PHP Version: 5.2.3 New Comment: It is actually not restricted to classes and stream_wrapper_register. Previous Comments: [2007-07-27 00:15:32] dinesh at dinsoft dot net Description: The error message produced by PHP is a non sense. This should just work. Reproduce code: --- class DSProxy { function stream_open(string $path, string $mode, int $options, string $opened_path) { return false; } ... } stream_wrapper_register('proxy', 'DSProxy') or die("ERROR: Could not register the proxy protocol!\n"); $fp = fopen('proxy://www.dinsoft.net', 'r'); Expected result: I expect it to work, or at least to produce a meaning full error message. Actual result: -- PHP Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an instance of string, string given in E:\dev\flights\proxy.php on line 8 Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an in stance of string, string given in E:\dev\flights\proxy.php on line 8 -- Edit this bug report at http://bugs.php.net/?id=42118&edit=1
#42118 [NEW]: stream_wrapper_register() with function prototyping with types
From: dinesh at dinsoft dot net Operating system: Windows PHP version: 5.2.3 PHP Bug Type: Scripting Engine problem Bug description: stream_wrapper_register() with function prototyping with types Description: The error message produced by PHP is a non sense. This should just work. Reproduce code: --- class DSProxy { function stream_open(string $path, string $mode, int $options, string $opened_path) { return false; } ... } stream_wrapper_register('proxy', 'DSProxy') or die("ERROR: Could not register the proxy protocol!\n"); $fp = fopen('proxy://www.dinsoft.net', 'r'); Expected result: I expect it to work, or at least to produce a meaning full error message. Actual result: -- PHP Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an instance of string, string given in E:\dev\flights\proxy.php on line 8 Catchable fatal error: Argument 1 passed to DSProxy::stream_open() must be an in stance of string, string given in E:\dev\flights\proxy.php on line 8 -- Edit bug report at http://bugs.php.net/?id=42118&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42118&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42118&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42118&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42118&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42118&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42118&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42118&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42118&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42118&r=support Expected behavior:http://bugs.php.net/fix.php?id=42118&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42118&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42118&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42118&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42118&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42118&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42118&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42118&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42118&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42118&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42118&r=mysqlcfg
#42113 [Opn->Fbk]: Problem with placeholders and escaped quotes in string constants
ID: 42113 Updated by: [EMAIL PROTECTED] Reported By: dominique dot archambault at gmail dot com -Status: Open +Status: Feedback Bug Type: PDO related Operating System: Debian lenny PHP Version: 5.2.3 New Comment: Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi Previous Comments: [2007-07-26 16:03:44] dominique dot archambault at gmail dot com Description: Using PHP 5.2.3 and MySQL 5.0.38. If there are placeholders in string constants of an SQL query, and there are also escaped quotes in a string constant (either the same string constant, or a different one), the following error is triggered: Warning: PDOStatement::execute(): SQLSTATE[HY093]: Invalid parameter number: no parameters were bound in on line Reproduce code: --- // WORKS $stmt = $pdo->prepare("SELECT * FROM `test` WHERE `test`.`text` = \"Hello world's! 2007-01-01 00:00:00\""); if ($stmt->execute()) { print "PASSED!\n"; } else { // should not enter this print "FAILED!\n"; var_dump($stmt->errorInfo()); } // DOES NOT WORK $stmt = $pdo->prepare("SELECT * FROM `test` WHERE `test`.`text` = 'Hello world\'s! 2007-01-01 00:00:00'"); // the following execute() call will generate the error if ($stmt->execute()) { print "PASSED!\n"; } else { // will always enter this print "FAILED!\n"; var_dump($stmt->errorInfo()); // will contain: array(1) { [0]=> string(5) "HY093" } } Expected result: PASSED! PASSED! Actual result: -- PASSED! Warning: PDOStatement::execute(): SQLSTATE[HY093]: Invalid parameter number: no parameters were bound in on line FAILED! array(1) { [0]=> string(5) "HY093" } -- Edit this bug report at http://bugs.php.net/?id=42113&edit=1
#42117 [NEW]: bzip2.compress loses data in internal buffer
From: phofstetter at sensational dot ch Operating system: Linux and Mac OSX PHP version: 5.2.3 PHP Bug Type: Streams related Bug description: bzip2.compress loses data in internal buffer Description: When bzip2.compress is attached to a stream and enough data is created so the output will be larger than some internal buffer, all data in the last not totally full buffer seems to get lost on the way out. The sample code contains quite a lot of filler text which is needed to actually fill up the internal buffer full enough to trigger the problem. I always had this problem since the stream filters got introduced into PHP, but now I could finally create a very much reduced test case explaining the problem. Reproduce code: --- Expected result: If I call the script with ./script.php blah and then use bzcat blah I expect the complete data output to the console. from BEGIN (0) to END () Actual result: -- bzcat outputs until somewhere around "END (9207)" and then bails out with bzcat: Compressed file ends unexpectedly; perhaps it is corrupted? *Possible* reason follows. bzcat: Unknown error: 0 Input file = blah, output file = (stdout) It is possible that the compressed file(s) have become corrupted. You can use the -tvv option to test integrity of such files. You can use the `bzip2recover' program to attempt to recover data from undamaged sections of corrupted files. and true enough - the file is not completely written. -- Edit bug report at http://bugs.php.net/?id=42117&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42117&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42117&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42117&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42117&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42117&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42117&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42117&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42117&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42117&r=support Expected behavior:http://bugs.php.net/fix.php?id=42117&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42117&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42117&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42117&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42117&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42117&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42117&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42117&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42117&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42117&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42117&r=mysqlcfg
#42093 [Bgs]: php5ts.dll causes the IIS application pool to crash
ID: 42093 User updated by: ailene dot nichol at tandberg dot com Reported By: ailene dot nichol at tandberg dot com Status: Bogus Bug Type: IIS related Operating System: Windows Server 2003 SP2 PHP Version: 5.2CVS-2007-07-24 New Comment: Thank you for your reply. If there is anything I can do to give you more information, please let me know. Previous Comments: [2007-07-26 09:51:17] [EMAIL PROTECTED] We are aware of PHP's problems with stability under IIS and are working to rectify the problem. Unfortunatly your bug report does not contain any extra useful information and we already have enough bug reports open about this issue. If you can provide more detailed information such as a reproducable crash or a backtrace please do so and reopen this bug. Otherwise please keep trying new releases as we are working to resolve the problems on this platform Thanks for your interest in PHP. [2007-07-25 03:40:21] ailene dot nichol at tandberg dot com Description: I have a script that does digest authentication. The script works as expected and the page will load correctly, but as soon as I run this script, the IIS default application pool will crash when requesting any other page. Occasionally I see in the Event Logs that the application pool crashes with other scripts, but with the digest authentication it is always reproducible. I have also tried the latest php found in php5.2-win32-200707241230.zip and can still produce the crash. Reproduce code: --- // This is the guts of the digest authentication code. It is all taken from samples on php.net. if (isset($headers['AUTHORIZATION'])) { if($data = http_digest_parse($headers['AUTHORIZATION'])) { $A1 = md5($user . ':' . $realm . ':' . $pwd); $A2 = md5($_SERVER['REQUEST_METHOD'].':'.$data['uri']); $valid_response = md5($A1.':'.$data['nonce'].':'.$data['nc'].':'.$data['cnonce'].':'.$data['qop'].':'.$A2); if ($data['response'] == $valid_response) { $_SERVER['AUTH_USER'] = $data['username']; return 0; } } } header('HTTP/1.1 401 Unauthorized'); header('WWW-Authenticate: Digest realm="' . $realm . '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"'); Actual result: -- FAULTING_IP: php5ts!_zend_mm_free_int+66 [Zend\zend_alloc.c @ 1921] 020ea9d6 8a0437 mov al,byte ptr [edi+esi] EXCEPTION_RECORD: -- (.exr ) ExceptionAddress: 020ea9d6 (php5ts!_zend_mm_free_int+0x0066) ExceptionCode: c005 (Access violation) ExceptionFlags: NumberParameters: 2 Parameter[0]: Parameter[1]: 06b8d148 Attempt to read from address 06b8d148 DEFAULT_BUCKET_ID: APPLICATION_FAULT PROCESS_NAME: w3wp.exe ERROR_CODE: (NTSTATUS) 0xc005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". READ_ADDRESS: 06b8d148 BUGCHECK_STR: ACCESS_VIOLATION LAST_CONTROL_TRANSFER: from 020ebad9 to 020ea9d6 STACK_TEXT: 00f7e68c 020ebad9 02edb0b0 02edb168 02196397 php5ts!_zend_mm_free_int+0x66 [Zend\zend_alloc.c @ 1921] 00f7e71c 77f76bfa 77f76c2f 00f7e860 8000 php5ts!_efree+0x39 [Zend\zend_alloc.c @ 2254] 00f7f90c 10002128 0105f8b8 5a3211a0 advapi32!LocalBaseRegOpenKey+0xe9 00f7fe04 5a322991 0105f8b8 0105e5f8 0105f248 php5isapi!HttpExtensionProc+0x348 [sapi\isapi\php5isapi.c @ 917] 00f7fe24 5a3968ff 0105f828 10001de0 00f7fe50 w3isapi!ProcessIsapiRequest+0x214 00f7fe58 5a3967e0 0105e5f8 w3core!W3_ISAPI_HANDLER::IsapiDoWork+0x3fd 00f7fe78 5a396764 00f7fee8 0105e5f8 w3core!W3_ISAPI_HANDLER::DoWork+0xb0 00f7fe98 5a3966f4 0105e5f8 00f7fec4 w3core!W3_HANDLER::MainDoWork+0x16e 00f7fea8 5a3966ae 0105e600 0105e5f8 0001 w3core!W3_CONTEXT::ExecuteCurrentHandler+0x53 00f7fec4 5a396648 0001 00f7fee8 0026b480 w3core!W3_CONTEXT::ExecuteHandler+0x51 00f7feec 5a392264 w3core!W3_STATE_HANDLE_REQUEST::DoWork+0x9a 00f7ff10 5a3965ea w3core!W3_MAIN_CONTEXT::DoWork+0xa6 00f7ff2c 5a36169f 0105db30 0105db30 5a361650 w3core!W3_MAIN_CONTEXT::OnNewRequest+0x55 00f7ff38 5a361650 00268838 00268844 00f7ff5c w3dt!UL_NATIVE_REQUEST::DoStateProcess+0x48 00f7ff48 5a3616ca 02d4 0105db34 w3dt!UL_NATIVE_REQUEST::DoWork+0x7f 00f7ff5c 5a3024ce 02d4 0105db34 w3dt!OverlappedCompletionRoutine+0x1a 00f7ff8c 5a3026ac 002688b0 5a30 w3tp!THREAD_POOL_DATA::ThreadPoolThread+0x73 00f7ffa0 5a301da9 00268838 w3tp!THREAD_POOL_DATA::ThreadPoolThread+0x24 00f7ffb8 77e64829 002688b0 w3tp!THREAD_MANAGER::ThreadManagerThread+0x39 00
#42116 [NEW]: Safe eval()
From: kripper3 at hotmail dot com Operating system: Irrelevant PHP version: 5.2.3 PHP Bug Type: Feature/Change Request Bug description: Safe eval() Description: eval($code) makes it possible to execute PHP code. It becames usefull when $code is provided dynamically (by the user of the application). For example, in order to compute a math expression provided by the user via a Web Interface. A lot of applications are using eval() this way. The problem is that eval() is not safe, and makes it possible to inject code. For example, instead of providing a math expression, I could provide code for listing files, get the content of the scripts and obtain hardcoded passwords. On http://www.php.net/manual/en/function.eval.php#75389 someone proposed a parser to detect disallowed PHP functions, but since the evaled code can be very flexible (ie. "$a = 'un' . 'link'; $a('')"), it seems the solution must be implemented in the engine. In other words, there should be a secure sandbox eval() function, let's say "save_eval()". I guess this could be difficult to implement. Besides, the definition of "save" may be subjective. I would define "save" as, at least, to not allow someone to do I/O operations (ie. read/write files, access URL's, etc.) and not access the applications code space (ie. change $GLOBALS, $_SESSION, $_SERVER, etc). To day, to use eval() implies a security risk in almost any app. that uses this function. Besides, we are missing a BIG RED WARNING BOX in the documentation page to inform our PHP users. Therefore, it is a social bug. Related "Bug": http://bugs.php.net/bug.php?id=40722&edit=2 IMO, it's no serious answer, since OS privileges cannot avoid reading passwords in PHP scripts or inyecting: $_SESSION['isAdmin'] = 'ok...let_me_hack_your_php_app') Reproduce code: --- eval() or save_eval() Expected result: ERROR: Evaled code cannot execute function '' Actual result: -- Irrelevant. -- Edit bug report at http://bugs.php.net/?id=42116&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42116&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42116&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42116&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42116&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42116&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42116&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42116&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42116&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42116&r=support Expected behavior:http://bugs.php.net/fix.php?id=42116&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42116&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42116&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42116&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42116&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42116&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42116&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42116&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42116&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42116&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42116&r=mysqlcfg
#42105 [Fbk->Opn]: CLI binary segfaults on ldap_bind(), Apache module works fine
ID: 42105 User updated by: paul at moonkhan dot org Reported By: paul at moonkhan dot org -Status: Feedback +Status: Open Bug Type: CGI related Operating System: RHEL4 PHP Version: 5.2CVS-2007-07-26 New Comment: Here is the configure line: Configure Command => './configure' '--with-apxs2=/usr/local/httpd-2.2.4/bin/apxs' '--prefix=/usr/local/php-5.2.1' '--sysconfdir=/usr/local/etc/php' '--with-config-file-path=/usr/local/etc/php' '--with-gd' '--with-zlib-dir=/usr' '--with-jpeg-dir=/usr' '--with-ldap' '--with-mcrypt' '--with-mhash' '--with-curl' '--with-openssl' '--with-xsl' '--with-libxml' '--with-pear=/usr/local/pear' '--with-mysql' '--with-oci8=instantclient,/usr/src/instantclient_10_2' '--with-sigchild' '--with-custom-odbc=/usr/local/odbc32v52' '--with-ttf' '--with-freetype-dir=/usr' Just ignore the weird --prefix - I had no intention of doing a make install on this compile :) Also, on the snapshot configure, it mentioned that --with-libxml and --with-sigchild are not real options anymore but I just left them in there anyways. Thanks, -Paul Previous Comments: [2007-07-26 15:29:31] [EMAIL PROTECTED] What was the full configure line used? (check from CLI php with -i option :) [2007-07-26 14:09:39] paul at moonkhan dot org The CVS snapshot didn't fix the segfaulting when using the command line binary. [2007-07-25 19:52:02] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi [2007-07-25 16:19:09] paul at moonkhan dot org Description: ldap_bind(), whether anonymous or not, produces a Segfault when run from the command line. This is occurring on 5.2.3 (and I can reproduce it on 5.2.1). Please note that 5.1.6 does not have this problem. Reproduce code: --- $ds = ldap_connect("ldaps://ldap.example.com"); if($ds) { echo "Connected\n"; // Anonymous bind $br = ldap_bind($ds); // Use this for authenticated binds //$br = ldap_bind($ds, $argv[1], $argv[2]); echo "Bind result: $br\n"; } Expected result: Connected Bind result: 1 Actual result: -- Connected Bind result: 1 Segmentation fault Backtrace: (gdb) bt #0 0x005c5140 in ASN1_primitive_free () from /lib/libcrypto.so.4 #1 0x005c518a in ASN1_primitive_free () from /lib/libcrypto.so.4 #2 0x005c521d in ASN1_primitive_free () from /lib/libcrypto.so.4 #3 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #4 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #5 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #6 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #7 0x005c5493 in ASN1_item_free () from /lib/libcrypto.so.4 #8 0x005c05d1 in X509_free () from /lib/libcrypto.so.4 #9 0x003e9712 in ssl_sess_cert_free () from /lib/libssl.so.4 #10 0x003ea4b9 in SSL_SESSION_free () from /lib/libssl.so.4 #11 0x003e825b in SSL_free () from /lib/libssl.so.4 #12 0x00a57b13 in ldap_pvt_tls_init () from /usr/lib/libldap-2.2.so.7 #13 0x002f5726 in ber_sockbuf_remove_io () from /usr/lib/liblber- 2.2.so.7 #14 0x002f57d6 in ber_int_sb_destroy () from /usr/lib/liblber-2.2.so.7 #15 0x002f586d in ber_sockbuf_free () from /usr/lib/liblber-2.2.so.7 #16 0x00a418e8 in ldap_ld_free () from /usr/lib/libldap-2.2.so.7 #17 0x00a41b16 in ldap_unbind_ext () from /usr/lib/libldap-2.2.so.7 #18 0x00a41c60 in ldap_unbind_s () from /usr/lib/libldap-2.2.so.7 #19 0x0812099f in _close_ldap_link (rsrc=0xb7fab080) at /usr/src/php- 5.2.3/ext/ldap/ldap.c:200 #20 0x08290781 in list_entry_destructor (ptr=0xb7fab080) at /usr/src/php-5.2.3/Zend/zend_list.c:184 #21 0x0828e409 in zend_hash_del_key_or_index (ht=0x84066e0, arKey=0x0, nKeyLength=0, h=4, flag=1) at /usr/src/php-5.2.3/Zend/zend_hash.c:497 #22 0x0829051c in _zend_list_delete (id=4) at /usr/src/php- 5.2.3/Zend/zend_list.c:58 #23 0x08279799 in _zval_ptr_dtor (zval_ptr=0xb7faa128) at /usr/src/php-5.2.3/Zend/zend_variables.h:35 #24 0x0828f750 in zend_hash_apply_deleter (ht=0x8406650, p=0xb7faa11c) at /usr/src/php-5.2.3/Zend/zend_hash.c:611 #25 0x0828f7eb in zend_hash_graceful_reverse_destroy (ht=0x8406650) at /usr/src/php-5.2.3/Zend/zend_hash.c:646 #26 0x08279dfa in shutdown_executor () at /usr/src/php- 5.2.3/Zend/zend_execute_API.c:239 #27 0x08286354 in zend_deactivate () at /usr/src/php- 5.2.3/Zend/zend.c:860 #28 0x0824f058 in php_request_shutdown (dummy=0x0) at /usr/src/php- 5.2.3/main/main.c:1317 #29 0x08300b5f in main (argc=2, argv=0xbfe04c7
#42115 [NEW]: Should not allow static keyword before visibility keyword
From: mattsch at gmail dot com Operating system: Gentoo Linux PHP version: 5.2.3 PHP Bug Type: Class/Object related Bug description: Should not allow static keyword before visibility keyword Description: Contrary to the documentation, you're allowed to put the static keyword before the visibility keyword. Shouldn't this throw an E_STRICT warning? Reproduce code: --- Expected result: E_STRICT: You cannot declare static before a visibility keyword. Actual result: -- Echoes "test" without warning. -- Edit bug report at http://bugs.php.net/?id=42115&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42115&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42115&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42115&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42115&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42115&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42115&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42115&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42115&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42115&r=support Expected behavior:http://bugs.php.net/fix.php?id=42115&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42115&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42115&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42115&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42115&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42115&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42115&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42115&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42115&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42115&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42115&r=mysqlcfg
#42114 [Opn->Bgs]: If(!is_integer($_POST['T2'])){...} is_integer Doesnt work
ID: 42114 Updated by: [EMAIL PROTECTED] Reported By: NeMewSys at hotmail dot com -Status: Open +Status: Bogus Bug Type: *General Issues Operating System: Windows XP PHP Version: 5.2.3 New Comment: Thank you for taking the time to write to us, but this is not a bug. Please double-check the documentation available at http://www.php.net/manual/ and the instructions on how to report a bug at http://bugs.php.net/how-to-report.php . Previous Comments: [2007-07-26 19:09:49] NeMewSys at hotmail dot com Description: If(!is_integer($_POST['T2'])){...} This is not working. Reproduce code: --- If(!is_integer($_POST['T2'])){...} //This is not working. Expected result: True or False, i only get False Actual result: -- False only -- Edit this bug report at http://bugs.php.net/?id=42114&edit=1
#31892 [Com]: PHP_SELF incorrect without cgi.fix_pathinfo, but turning on screws up PATH_INFO
ID: 31892 Comment by: mccammos at onid dot oregonstate dot edu Reported By: ceefour at gauldong dot net Status: No Feedback Bug Type: CGI related Operating System: * PHP Version: 5CVS, 4CVS (2005-02-11) New Comment: I just tried a July 26, 2007 snapshot of php5.2 and can report that the bug still remains unfixed. Previous Comments: [2007-07-18 01:00:00] php-bugs at lists dot php dot net No feedback was provided for this bug for over a week, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open". [2007-07-10 11:34:53] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi [2006-05-29 18:47:35] php dot net at jon dot limedaley dot com I assume this isn't going to be fixed? since it has been a year since it was reported, and it is still in the "verified" state. I figured php5 would be stable by now, but it appears that php_self is broken with cgi.fix_pathinfo=0 and _SERVER["PATH_INFO"] is broken with cgi.fix_pathinfo=1. Is the official solution to use php4 instead? [2006-05-11 14:34:54] kk at keppler-it dot de These patches are based on the code from Dave; the work fine within our hosting environment. http://www.keppler-it.de/tmp/patch-31892-4.4.2.diff http://www.keppler-it.de/tmp/patch-31892-5.1.4.diff Comments welcome. :-) Here's the code in clear text (nearly identical for 4.x and 5.x): --- php-4.4.2/sapi/cgi/cgi_main.c.orig 2006-01-01 14:47:01.0 +0100 +++ php-4.4.2/sapi/cgi/cgi_main.c 2006-05-11 16:23:51.0 +0200 @@ -871,11 +871,25 @@ } else { #endif /* pre 4.3 behaviour, shouldn't be used but provides BC */ + /* if (env_path_info) { SG(request_info).request_uri = env_path_info; } else { SG(request_info).request_uri = env_script_name; } + */ + /* <[EMAIL PROTECTED]> PHP_SELF := SCRIPT_NAME + PATH_INFO */ + /* Patch based upon http://spoonguard.org/dave/classes/cs345/bugfix/php-5.1.2-31892.diff */ + SG(request_info).request_uri = sapi_cgibin_getenv("SCRIPT_NAME", 0 TSRMLS_CC); + if (SG(request_info).request_uri && (env_path_info = sapi_cgibin_getenv("PATH_INFO", 0 TSRMLS_CC))) { + int request_uri_len = strlen(SG(request_info).request_uri) + strlen(env_path_info) + 1; + char *request_uri = (char *) emalloc(request_uri_len); + *request_uri = '\0'; + strcat(request_uri, SG(request_info).request_uri); + strcat(request_uri, env_path_info); + SG(request_info).request_uri = request_uri; + } + /* */ #if !DISCARD_PATH if (env_path_translated) script_path_translated = env_path_translated; [2006-05-09 02:11:21] lwalker at magi dot net dot au I'm expreiencing the same issue on PHP 4.3 + 4.4 under Apache 1.3.33 and have had to switch back to mod_php for our hosting server. Tried to access the patch to have a look at it, however it's not loading. Do you still have a copy of the patch, or are you able to post a backported PHP 4.x version? I do believe that SCRIPT_NAME + PHP_INFO is the expected behaviour. The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/31892 -- Edit this bug report at http://bugs.php.net/?id=31892&edit=1
#42114 [NEW]: If(!is_integer($_POST['T2'])){...} is_integer Doesnt work
From: NeMewSys at hotmail dot com Operating system: Windows XP PHP version: 5.2.3 PHP Bug Type: *General Issues Bug description: If(!is_integer($_POST['T2'])){...} is_integer Doesnt work Description: If(!is_integer($_POST['T2'])){...} This is not working. Reproduce code: --- If(!is_integer($_POST['T2'])){...} //This is not working. Expected result: True or False, i only get False Actual result: -- False only -- Edit bug report at http://bugs.php.net/?id=42114&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42114&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42114&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42114&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42114&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42114&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42114&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42114&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42114&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42114&r=support Expected behavior:http://bugs.php.net/fix.php?id=42114&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42114&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42114&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42114&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42114&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42114&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42114&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42114&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42114&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42114&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42114&r=mysqlcfg
#42111 [NEW]: copy() does unexpected creation of file for dir as src & returns FALSE as expec
From: mahesh dot vemula at in dot ibm dot com Operating system: RHEL4 PHP version: 5CVS-2007-07-26 (CVS) PHP Bug Type: Scripting Engine problem Bug description: copy() does unexpected creation of file for dir as src & returns FALSE as expec Description: While trying to create a copy of an existing dir by copy() function, it creates a file which is not expected but returns FALSE as expected. Even for an existing file as second argument, PHP doesnt throw any warning message. It happens against Linux, and works fine against Windows. Reproduce code: --- Expected result: Creation of file is not expected and a required warning messages are expected. Actual result: -- Warning: copy(copy1): failed to open stream: Is a directory in %s on line %d bool(false) Warning: copy(copy): failed to open stream: Is a directory in %s on line %d bool(false) bool(false) bool(false) bool(false) -- Edit bug report at http://bugs.php.net/?id=42111&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42111&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42111&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42111&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42111&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42111&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42111&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42111&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42111&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42111&r=support Expected behavior:http://bugs.php.net/fix.php?id=42111&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42111&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42111&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42111&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42111&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42111&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42111&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42111&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42111&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42111&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42111&r=mysqlcfg
#42106 [Opn->Fbk]: Build fails due to duplicate symbols (missing externs)
ID: 42106 Updated by: [EMAIL PROTECTED] Reported By: chris at improbable dot org -Status: Open +Status: Feedback Bug Type: Compile Failure Operating System: Mac OS X PHP Version: 5.2.3 New Comment: What compiler (and version) are you using? Does this happen if you don't set the CFLAGS? Previous Comments: [2007-07-26 00:18:03] chris at improbable dot org 5.2-latest fails in exactly the same fashion: ld64-74.4 failed: duplicate symbol _php_bz2_filter_factory in ext/bz2/bz2_filter.o and ext/bz2/bz2.o The fix is identical. [2007-07-25 21:30:55] chris at improbable dot org Description: The build failed with a duplicate symbol error: ld64-74.4 failed: duplicate symbol _php_bz2_filter_factory in ext/bz2/bz2_filter.o and ext/bz2/bz2.o This was solved by adding extern to the php_bz2_filter_factory declaration in ext/bz2/php_bz2.h An identical problem happened with Zend/zend_ini_scanner.c with the yytext declaration on line 478 (there is an earlier declaration in the same file which is already declared extern). Reproduce code: --- CFLAGS=-fast ./configure --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info --disable-dependency-tracking --with-apxs2=/usr/sbin/apxs --with-ldap=/usr --enable-cli --with-zlib-dir=/usr --with-xml --enable-exif --enable-mbstring --enable-mbregex --enable-sockets --with-curl=/usr --with-config-file-path=/etc --sysconfdir=/private/etc --with-mysql-sock=/tmp/mysql --with-mysql=shared,/usr/local/mysql --with-mysqli=shared,`which mysql_config` --with-pdo-mysql=shared,`which mysql_config` --with-openssl --with-xmlrpc --with-xsl=/usr --with-pear=/Library/PHP --with-bz2 --enable-bcmath --disable-cgi --enable-zip --enable-memory-limit --enable-pcntl --with-zlib=/usr --with-zlib-dir=/usr --with-ldap --enable-memcache -- Edit this bug report at http://bugs.php.net/?id=42106&edit=1
#42105 [Opn->Asn]: CLI binary segfaults on ldap_bind(), Apache module works fine
ID: 42105 Updated by: [EMAIL PROTECTED] Reported By: paul at moonkhan dot org -Status: Open +Status: Assigned Bug Type: CGI related Operating System: RHEL4 PHP Version: 5.2CVS-2007-07-26 -Assigned To: +Assigned To: jani New Comment: Those two options configure said are unknown have actually never existed. The correct ones are "--enable-libxml" and "--enable-sigchild". I'll try with your configure line and try to reproduce this. Previous Comments: [2007-07-26 15:38:38] paul at moonkhan dot org Here is the configure line: Configure Command => './configure' '--with-apxs2=/usr/local/httpd-2.2.4/bin/apxs' '--prefix=/usr/local/php-5.2.1' '--sysconfdir=/usr/local/etc/php' '--with-config-file-path=/usr/local/etc/php' '--with-gd' '--with-zlib-dir=/usr' '--with-jpeg-dir=/usr' '--with-ldap' '--with-mcrypt' '--with-mhash' '--with-curl' '--with-openssl' '--with-xsl' '--with-libxml' '--with-pear=/usr/local/pear' '--with-mysql' '--with-oci8=instantclient,/usr/src/instantclient_10_2' '--with-sigchild' '--with-custom-odbc=/usr/local/odbc32v52' '--with-ttf' '--with-freetype-dir=/usr' Just ignore the weird --prefix - I had no intention of doing a make install on this compile :) Also, on the snapshot configure, it mentioned that --with-libxml and --with-sigchild are not real options anymore but I just left them in there anyways. Thanks, -Paul [2007-07-26 15:29:31] [EMAIL PROTECTED] What was the full configure line used? (check from CLI php with -i option :) [2007-07-26 14:09:39] paul at moonkhan dot org The CVS snapshot didn't fix the segfaulting when using the command line binary. [2007-07-25 19:52:02] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi [2007-07-25 16:19:09] paul at moonkhan dot org Description: ldap_bind(), whether anonymous or not, produces a Segfault when run from the command line. This is occurring on 5.2.3 (and I can reproduce it on 5.2.1). Please note that 5.1.6 does not have this problem. Reproduce code: --- $ds = ldap_connect("ldaps://ldap.example.com"); if($ds) { echo "Connected\n"; // Anonymous bind $br = ldap_bind($ds); // Use this for authenticated binds //$br = ldap_bind($ds, $argv[1], $argv[2]); echo "Bind result: $br\n"; } Expected result: Connected Bind result: 1 Actual result: -- Connected Bind result: 1 Segmentation fault Backtrace: (gdb) bt #0 0x005c5140 in ASN1_primitive_free () from /lib/libcrypto.so.4 #1 0x005c518a in ASN1_primitive_free () from /lib/libcrypto.so.4 #2 0x005c521d in ASN1_primitive_free () from /lib/libcrypto.so.4 #3 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #4 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #5 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #6 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #7 0x005c5493 in ASN1_item_free () from /lib/libcrypto.so.4 #8 0x005c05d1 in X509_free () from /lib/libcrypto.so.4 #9 0x003e9712 in ssl_sess_cert_free () from /lib/libssl.so.4 #10 0x003ea4b9 in SSL_SESSION_free () from /lib/libssl.so.4 #11 0x003e825b in SSL_free () from /lib/libssl.so.4 #12 0x00a57b13 in ldap_pvt_tls_init () from /usr/lib/libldap-2.2.so.7 #13 0x002f5726 in ber_sockbuf_remove_io () from /usr/lib/liblber- 2.2.so.7 #14 0x002f57d6 in ber_int_sb_destroy () from /usr/lib/liblber-2.2.so.7 #15 0x002f586d in ber_sockbuf_free () from /usr/lib/liblber-2.2.so.7 #16 0x00a418e8 in ldap_ld_free () from /usr/lib/libldap-2.2.so.7 #17 0x00a41b16 in ldap_unbind_ext () from /usr/lib/libldap-2.2.so.7 #18 0x00a41c60 in ldap_unbind_s () from /usr/lib/libldap-2.2.so.7 #19 0x0812099f in _close_ldap_link (rsrc=0xb7fab080) at /usr/src/php- 5.2.3/ext/ldap/ldap.c:200 #20 0x08290781 in list_entry_destructor (ptr=0xb7fab080) at /usr/src/php-5.2.3/Zend/zend_list.c:184 #21 0x0828e409 in zend_hash_del_key_or_index (ht=0x84066e0, arKey=0x0, nKeyLength=0, h=4, flag=1) at /usr/src/php-5.2.3/Zend/zend_hash.c:497 #22 0x0829051c in _zend_list_delete (id=4) at /usr/src/php- 5.2.3/Zend/zend_list.c:58 #23 0x08279799 in _zval_ptr_dtor (zval_ptr=0xb7faa128) at /usr/src/php-5.2.3/Zend/zend_variables.h:35 #24 0x0828f750 in zend_hash_apply_deleter (ht=0x8406650, p=0xb7faa11c) at /usr/src/php-5.2.3/Zend/zend_hash.c:611 #25 0x0828f7eb in zend_hash_graceful_reverse_destroy (ht
#41984 [Csd]: Detail on which files changed?
ID: 41984 User updated by: mr_walsh at yahoo dot com -Summary: Hangs on large SoapClient requests Reported By: mr_walsh at yahoo dot com Status: Closed Bug Type: SOAP related Operating System: Linux and OSX PHP Version: 5.2.3 Assigned To: dmitry New Comment: Hi Dimitry: Is this checked into the 5.x tree, the 6.x tree, or both? Any way you could tell me which file(s) got touched? If it's minor I can patch my version? Thanks again for fixing this! Previous Comments: [2007-07-24 14:25:25] [EMAIL PROTECTED] This bug has been fixed in CVS. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. [2007-07-13 20:59:28] mr_walsh at yahoo dot com Here's a way to reproduce it...I have a web service server running. Hit it with this code. It hangs if you send ~68000 bytes or more (though the limit seemed to be closer to 15000 on a Linux box) post = str_repeat('a',68536); } } $client = new SOAPClient("https://boxaroo.whateverittakes.com/BoxarooToPII.asmx?WSDL";, array('trace' => 1, 'soap_version' => SOAP_1_2) ); $t = new Test(); $resp = $client->Test($t); echo strlen($resp->TestResult); ?> [2007-07-13 14:19:38] [EMAIL PROTECTED] I am not able to reproduce the problem on Linux. Does the following script hangs for you? "http://localhost:8080/";, "uri" => "test://")); echo $client->getQuote(str_repeat('a',65536)); ?> [2007-07-12 22:22:10] mr_walsh at yahoo dot com The socket connection is stuck on 'CLOSE_WAIT' [2007-07-12 22:00:59] mr_walsh at yahoo dot com Description: Recently I added a field with a large string to an already stable SOAP call. This made the SoapClient call hang. I was able in fact to see from _getLastRequest that if the raw sent XML PHP generates is over 67979 bytes on Mac OSX or something like 11000 bytes on Linux the problem happens every time. I ran in the debugger and it makes it nearly certain this is some sort of socket interface problem. This seems just like bug #29256 but I'm using the very latest php 5.2.3. Is there some sort of socket configuration I can do as a workaround? #1 0x004d3a31 in send () from /lib/tls/libpthread.so.0 #2 0x082796e3 in php_sockop_write (stream=0xb7ecc508, buf=0xb73c9018 "szwOUrHRAXXwmeqiMzFOndm1nfunsjT+Hy63WxwOoCJ6Q0Ar9Py8rC8rwzRAttA/H/oqvzMywB46gqL6MzGQwmmE5HNLz02Gehchq6puU1pFZOX4LabnB6Jp1+XYfbGjKkAvYbNPBvM10oACKAGaoTGBBnGpk+IuWq4NDXdSgOHot51/K8NE1zdTuk6wWIAvnMI9B64Z"..., count=7259) at /home/msw/php-5.2.3/main/streams/xp_socket.c:62 #3 0x08095448 in php_openssl_sockop_write (stream=0xb7ecc508, buf=0xb73c9018 "szwOUrHRAXXwmeqiMzFOndm1nfunsjT+Hy63WxwOoCJ6Q0Ar9Py8rC8rwzRAttA/H/oqvzMywB46gqL6MzGQwmmE5HNLz02Gehchq6puU1pFZOX4LabnB6Jp1+XYfbGjKkAvYbNPBvM10oACKAGaoTGBBnGpk+IuWq4NDXdSgOHot51/K8NE1zdTuk6wWIAvnMI9B64Z"..., count=7259) at /home/msw/php-5.2.3/ext/openssl/xp_ssl.c:203 #4 0x08271491 in _php_stream_write_buffer (stream=0xb7ecc508, buf=0xb73c9018 "szwOUrHRAXXwmeqiMzFOndm1nfunsjT+Hy63WxwOoCJ6Q0Ar9Py8rC8rwzRAttA/H/oqvzMywB46gqL6MzGQwmmE5HNLz02Gehchq6puU1pFZOX4LabnB6Jp1+XYfbGjKkAvYbNPBvM10oACKAGaoTGBBnGpk+IuWq4NDXdSgOHot51/K8NE1zdTuk6wWIAvnMI9B64Z"..., count=7259) at /home/msw/php-5.2.3/main/streams/streams.c:912 #5 0x081988f4 in make_http_soap_request (this_ptr=0xb7b1fb90, buf=0x8b194b8 "\nhttp://schemas.xmlsoap.org/soap/envelope/\"; xmlns:ns1=\"https://boxaroo.whateverittakes.com\";>http://blah.com/blah.asmx";, soapaction=0xb7ab38bc "https://blah.com/SubmitRequest";, soap_version=1, buffer=0xb7b5f49c, buffer_len=0xb7b5f4a0) at /home/msw/php-5.2.3/ext/soap/php_http.c:683 #6 0x08184902 in zim_SoapClient___doRequest (ht=5, return_value=0xb7b5f49c, return_value_ptr=0x0, this_ptr=0xb7b1fb90, return_value_used=1) at /home/msw/php-5.2.3/ext/soap/soap.c:2993 #7 0x0828ee1a in zend_call_function (fci=0xbff12940, fci_cache=0x0) at /home/msw/php-5.2.3/Zend/zend_execute_API.c:989 #8 0x0828f5f0 in call_user_function_ex (function_table=0x1908, object_pp=0x1908, function_name=0x1908, retval_ptr_ptr=0x1908, param_count=6408, params=0x1908, no_separation=6408, symbol_table=0x1908) at /home/msw/php-5.2.3/Zend/zend_execute_API.c:602 #9 0x0828f62c in call_user_function (function_table=0x0, object_pp=0xbff129f0, function_name=0xbff12a70, retval_ptr=0xbff12be0, param_count=5, params=0xbff12a00) at /home/msw/php-5.2.3/Zend/zend_execute_API.c:575
#42113 [NEW]: Problem with placeholders and escaped quotes in string constants
From: dominique dot archambault at gmail dot com Operating system: Debian lenny PHP version: 5.2.3 PHP Bug Type: PDO related Bug description: Problem with placeholders and escaped quotes in string constants Description: Using PHP 5.2.3 and MySQL 5.0.38. If there are placeholders in string constants of an SQL query, and there are also escaped quotes in a string constant (either the same string constant, or a different one), the following error is triggered: Warning: PDOStatement::execute(): SQLSTATE[HY093]: Invalid parameter number: no parameters were bound in on line Reproduce code: --- // WORKS $stmt = $pdo->prepare("SELECT * FROM `test` WHERE `test`.`text` = \"Hello world's! 2007-01-01 00:00:00\""); if ($stmt->execute()) { print "PASSED!\n"; } else { // should not enter this print "FAILED!\n"; var_dump($stmt->errorInfo()); } // DOES NOT WORK $stmt = $pdo->prepare("SELECT * FROM `test` WHERE `test`.`text` = 'Hello world\'s! 2007-01-01 00:00:00'"); // the following execute() call will generate the error if ($stmt->execute()) { print "PASSED!\n"; } else { // will always enter this print "FAILED!\n"; var_dump($stmt->errorInfo()); // will contain: array(1) { [0]=> string(5) "HY093" } } Expected result: PASSED! PASSED! Actual result: -- PASSED! Warning: PDOStatement::execute(): SQLSTATE[HY093]: Invalid parameter number: no parameters were bound in on line FAILED! array(1) { [0]=> string(5) "HY093" } -- Edit bug report at http://bugs.php.net/?id=42113&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42113&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42113&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42113&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42113&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42113&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42113&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42113&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42113&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42113&r=support Expected behavior:http://bugs.php.net/fix.php?id=42113&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42113&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42113&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42113&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42113&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42113&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42113&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42113&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42113&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42113&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42113&r=mysqlcfg
#42112 [Opn->Asn]: deleting a node produces memory corruption
ID: 42112 Updated by: [EMAIL PROTECTED] Reported By: [EMAIL PROTECTED] -Status: Open +Status: Assigned Bug Type: DOM XML related Operating System: Linux PHP Version: 5CVS-2007-07-26 (CVS) -Assigned To: +Assigned To: rrichards New Comment: Hello Rob, could you please have a look at this one? Previous Comments: [2007-07-26 15:03:36] [EMAIL PROTECTED] Description: When running getElementById() on a node that just has been removed I get memory corruptions, and often a segfault. I am using libxml 2.6.29 Reproduce code: --- See http://files.derickrethans.nl/xml-crash.tar.bz2 run the script with "valgrind php xml-crash.php" Expected result: No valgrind errors :) Actual result: -- ==27233== Invalid read of size 8 ==27233==at 0x4D6548: zif_dom_document_get_element_by_id (document.c:1267) ==27233==by 0x873B94: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x873D23: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x873D23: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x84B283: zend_execute_scripts (zend.c:1134) ==27233==by 0x7F1629: php_execute_script (main.c:1967) ==27233== Address 0x9FEA200 is 40 bytes inside a block of size 96 free'd ==27233==at 0x4A2066A: free (vg_replace_malloc.c:233) ==27233==by 0x46BF04: php_libxml_node_free (libxml.c:197) ==27233==by 0x46C0A5: php_libxml_node_free_list (libxml.c:262) ==27233==by 0x46DF5F: php_libxml_node_free_resource (libxml.c:1013) ==27233==by 0x46DFEB: php_libxml_node_decrement_resource (libxml.c:1036) ==27233==by 0x4D2193: dom_objects_free_storage (php_dom.c:974) ==27233==by 0x87160D: zend_objects_store_del_ref_by_handle (zend_objects_API.c:206) ==27233==by 0x871465: zend_objects_store_del_ref (zend_objects_API.c:168) ==27233==by 0x848B5C: _zval_dtor_func (zend_variables.c:52) ==27233==by 0x839C98: _zval_dtor (zend_variables.h:35) ==27233==by 0x839EB1: _zval_ptr_dtor (zend_execute_API.c:414) ==27233==by 0x848ED1: _zval_ptr_dtor_wrapper (zend_variables.c:175) -- Edit this bug report at http://bugs.php.net/?id=42112&edit=1
#37900 [Opn->Fbk]: NULL values on a first record
ID: 37900 Updated by: [EMAIL PROTECTED] Reported By: ovendrell at oip dot jazztel dot es -Status: Open +Status: Feedback Bug Type: ODBC related Operating System: Linux PHP Version: 5.1.4 New Comment: Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi And try using the PDO ODBC instead. It has been reported to work much better.. Previous Comments: [2006-06-23 10:10:18] ovendrell at oip dot jazztel dot es Description: I work with this environment: * OS: Linux * Web server: Apache 2.0 * DB server: Microsoft SQL server (7.0 or 2000) * PHP 5.1.2 I execute a query with odbc_query() function. when the first record result has a NULL value in a field, the next record that doesn't has a NULL value in the same field doesn't return the correct value. It returns unrecognizable chars. Reproduce code: --- $res = odbc_exec ($bd, "SELECT Id, Num, Obs FROM publicacions"); odbc_result_all ($res); --- $res = odbc_exec ($bd, "SELECT Id, Num FROM publicacions"); while (odbc_fetch_row ($res)) echo odbc_result ($res, "Id")." ".odbc_result ($res, "Num")." ".odbc_result ($res, "Obs").""; Expected result: Id Num Obs -- 1NULL NULL 2NULL comment 323NULL 445a 5NULL 612c Actual result: -- Id Num Obs -- 1NULL NULL 2NULL [EMAIL PROTECTED]@ 3èH@ NULL 445a 5NULL 612c -- Edit this bug report at http://bugs.php.net/?id=37900&edit=1
#42105 [Opn->Fbk]: CLI binary segfaults on ldap_bind(), Apache module works fine
ID: 42105 Updated by: [EMAIL PROTECTED] Reported By: paul at moonkhan dot org -Status: Open +Status: Feedback Bug Type: CGI related Operating System: RHEL4 -PHP Version: 5.2.3 +PHP Version: 5.2CVS-2007-07-26 New Comment: What was the full configure line used? (check from CLI php with -i option :) Previous Comments: [2007-07-26 14:09:39] paul at moonkhan dot org The CVS snapshot didn't fix the segfaulting when using the command line binary. [2007-07-25 19:52:02] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi [2007-07-25 16:19:09] paul at moonkhan dot org Description: ldap_bind(), whether anonymous or not, produces a Segfault when run from the command line. This is occurring on 5.2.3 (and I can reproduce it on 5.2.1). Please note that 5.1.6 does not have this problem. Reproduce code: --- $ds = ldap_connect("ldaps://ldap.example.com"); if($ds) { echo "Connected\n"; // Anonymous bind $br = ldap_bind($ds); // Use this for authenticated binds //$br = ldap_bind($ds, $argv[1], $argv[2]); echo "Bind result: $br\n"; } Expected result: Connected Bind result: 1 Actual result: -- Connected Bind result: 1 Segmentation fault Backtrace: (gdb) bt #0 0x005c5140 in ASN1_primitive_free () from /lib/libcrypto.so.4 #1 0x005c518a in ASN1_primitive_free () from /lib/libcrypto.so.4 #2 0x005c521d in ASN1_primitive_free () from /lib/libcrypto.so.4 #3 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #4 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #5 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #6 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #7 0x005c5493 in ASN1_item_free () from /lib/libcrypto.so.4 #8 0x005c05d1 in X509_free () from /lib/libcrypto.so.4 #9 0x003e9712 in ssl_sess_cert_free () from /lib/libssl.so.4 #10 0x003ea4b9 in SSL_SESSION_free () from /lib/libssl.so.4 #11 0x003e825b in SSL_free () from /lib/libssl.so.4 #12 0x00a57b13 in ldap_pvt_tls_init () from /usr/lib/libldap-2.2.so.7 #13 0x002f5726 in ber_sockbuf_remove_io () from /usr/lib/liblber- 2.2.so.7 #14 0x002f57d6 in ber_int_sb_destroy () from /usr/lib/liblber-2.2.so.7 #15 0x002f586d in ber_sockbuf_free () from /usr/lib/liblber-2.2.so.7 #16 0x00a418e8 in ldap_ld_free () from /usr/lib/libldap-2.2.so.7 #17 0x00a41b16 in ldap_unbind_ext () from /usr/lib/libldap-2.2.so.7 #18 0x00a41c60 in ldap_unbind_s () from /usr/lib/libldap-2.2.so.7 #19 0x0812099f in _close_ldap_link (rsrc=0xb7fab080) at /usr/src/php- 5.2.3/ext/ldap/ldap.c:200 #20 0x08290781 in list_entry_destructor (ptr=0xb7fab080) at /usr/src/php-5.2.3/Zend/zend_list.c:184 #21 0x0828e409 in zend_hash_del_key_or_index (ht=0x84066e0, arKey=0x0, nKeyLength=0, h=4, flag=1) at /usr/src/php-5.2.3/Zend/zend_hash.c:497 #22 0x0829051c in _zend_list_delete (id=4) at /usr/src/php- 5.2.3/Zend/zend_list.c:58 #23 0x08279799 in _zval_ptr_dtor (zval_ptr=0xb7faa128) at /usr/src/php-5.2.3/Zend/zend_variables.h:35 #24 0x0828f750 in zend_hash_apply_deleter (ht=0x8406650, p=0xb7faa11c) at /usr/src/php-5.2.3/Zend/zend_hash.c:611 #25 0x0828f7eb in zend_hash_graceful_reverse_destroy (ht=0x8406650) at /usr/src/php-5.2.3/Zend/zend_hash.c:646 #26 0x08279dfa in shutdown_executor () at /usr/src/php- 5.2.3/Zend/zend_execute_API.c:239 #27 0x08286354 in zend_deactivate () at /usr/src/php- 5.2.3/Zend/zend.c:860 #28 0x0824f058 in php_request_shutdown (dummy=0x0) at /usr/src/php- 5.2.3/main/main.c:1317 #29 0x08300b5f in main (argc=2, argv=0xbfe04c74) at /usr/src/php- 5.2.3/sapi/cli/php_cli.c:1319 -- Edit this bug report at http://bugs.php.net/?id=42105&edit=1
#42107 [Asn->Csd]: sscanf broken when using %2$s type format parameters
ID: 42107 Updated by: [EMAIL PROTECTED] Reported By: mike at theupstairsroom dot com -Status: Assigned +Status: Closed Bug Type: Strings related Operating System: CentOS PHP Version: 5.2.3 Assigned To: jani New Comment: This bug has been fixed in CVS. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. Previous Comments: [2007-07-26 14:27:50] [EMAIL PROTECTED] Fix prepared. Running test now.. [2007-07-26 00:54:35] mike at theupstairsroom dot com Description: Unexpected results returned when using positioned parameters in sscanf() Reproduce code: --- $test = sscanf('test string', '%2$s %1$s'); print_r($test); Expected result: array( [0] => 'string', [1] => 'test' ) Actual result: -- Array ( [0] => [1] => [3] => test [2] => string ) -- Edit this bug report at http://bugs.php.net/?id=42107&edit=1
#42112 [NEW]: deleting a node produces memory corruption
From: [EMAIL PROTECTED] Operating system: Linux PHP version: 5CVS-2007-07-26 (CVS) PHP Bug Type: DOM XML related Bug description: deleting a node produces memory corruption Description: When running getElementById() on a node that just has been removed I get memory corruptions, and often a segfault. I am using libxml 2.6.29 Reproduce code: --- See http://files.derickrethans.nl/xml-crash.tar.bz2 run the script with "valgrind php xml-crash.php" Expected result: No valgrind errors :) Actual result: -- ==27233== Invalid read of size 8 ==27233==at 0x4D6548: zif_dom_document_get_element_by_id (document.c:1267) ==27233==by 0x873B94: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x873D23: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x873D23: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==27233==by 0x874902: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==27233==by 0x873635: execute (zend_vm_execute.h:92) ==27233==by 0x84B283: zend_execute_scripts (zend.c:1134) ==27233==by 0x7F1629: php_execute_script (main.c:1967) ==27233== Address 0x9FEA200 is 40 bytes inside a block of size 96 free'd ==27233==at 0x4A2066A: free (vg_replace_malloc.c:233) ==27233==by 0x46BF04: php_libxml_node_free (libxml.c:197) ==27233==by 0x46C0A5: php_libxml_node_free_list (libxml.c:262) ==27233==by 0x46DF5F: php_libxml_node_free_resource (libxml.c:1013) ==27233==by 0x46DFEB: php_libxml_node_decrement_resource (libxml.c:1036) ==27233==by 0x4D2193: dom_objects_free_storage (php_dom.c:974) ==27233==by 0x87160D: zend_objects_store_del_ref_by_handle (zend_objects_API.c:206) ==27233==by 0x871465: zend_objects_store_del_ref (zend_objects_API.c:168) ==27233==by 0x848B5C: _zval_dtor_func (zend_variables.c:52) ==27233==by 0x839C98: _zval_dtor (zend_variables.h:35) ==27233==by 0x839EB1: _zval_ptr_dtor (zend_execute_API.c:414) ==27233==by 0x848ED1: _zval_ptr_dtor_wrapper (zend_variables.c:175) -- Edit bug report at http://bugs.php.net/?id=42112&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42112&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42112&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42112&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42112&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42112&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42112&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42112&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42112&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42112&r=support Expected behavior:http://bugs.php.net/fix.php?id=42112&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42112&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42112&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42112&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42112&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42112&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42112&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42112&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42112&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42112&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42112&r=mysqlcfg
#42107 [Opn->Asn]: sscanf broken when using %2$s type format parameters
ID: 42107 Updated by: [EMAIL PROTECTED] Reported By: mike at theupstairsroom dot com -Status: Open +Status: Assigned Bug Type: Strings related Operating System: CentOS PHP Version: 5.2.3 -Assigned To: +Assigned To: jani New Comment: Fix prepared. Running test now.. Previous Comments: [2007-07-26 00:54:35] mike at theupstairsroom dot com Description: Unexpected results returned when using positioned parameters in sscanf() Reproduce code: --- $test = sscanf('test string', '%2$s %1$s'); print_r($test); Expected result: array( [0] => 'string', [1] => 'test' ) Actual result: -- Array ( [0] => [1] => [3] => test [2] => string ) -- Edit this bug report at http://bugs.php.net/?id=42107&edit=1
#42105 [Fbk->Opn]: CLI binary segfaults on ldap_bind(), Apache module works fine
ID: 42105 User updated by: paul at moonkhan dot org Reported By: paul at moonkhan dot org -Status: Feedback +Status: Open Bug Type: CGI related Operating System: RHEL4 PHP Version: 5.2.3 New Comment: The CVS snapshot didn't fix the segfaulting when using the command line binary. Previous Comments: [2007-07-25 19:52:02] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi [2007-07-25 16:19:09] paul at moonkhan dot org Description: ldap_bind(), whether anonymous or not, produces a Segfault when run from the command line. This is occurring on 5.2.3 (and I can reproduce it on 5.2.1). Please note that 5.1.6 does not have this problem. Reproduce code: --- $ds = ldap_connect("ldaps://ldap.example.com"); if($ds) { echo "Connected\n"; // Anonymous bind $br = ldap_bind($ds); // Use this for authenticated binds //$br = ldap_bind($ds, $argv[1], $argv[2]); echo "Bind result: $br\n"; } Expected result: Connected Bind result: 1 Actual result: -- Connected Bind result: 1 Segmentation fault Backtrace: (gdb) bt #0 0x005c5140 in ASN1_primitive_free () from /lib/libcrypto.so.4 #1 0x005c518a in ASN1_primitive_free () from /lib/libcrypto.so.4 #2 0x005c521d in ASN1_primitive_free () from /lib/libcrypto.so.4 #3 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #4 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #5 0x005c545d in ASN1_template_free () from /lib/libcrypto.so.4 #6 0x005c5383 in ASN1_primitive_free () from /lib/libcrypto.so.4 #7 0x005c5493 in ASN1_item_free () from /lib/libcrypto.so.4 #8 0x005c05d1 in X509_free () from /lib/libcrypto.so.4 #9 0x003e9712 in ssl_sess_cert_free () from /lib/libssl.so.4 #10 0x003ea4b9 in SSL_SESSION_free () from /lib/libssl.so.4 #11 0x003e825b in SSL_free () from /lib/libssl.so.4 #12 0x00a57b13 in ldap_pvt_tls_init () from /usr/lib/libldap-2.2.so.7 #13 0x002f5726 in ber_sockbuf_remove_io () from /usr/lib/liblber- 2.2.so.7 #14 0x002f57d6 in ber_int_sb_destroy () from /usr/lib/liblber-2.2.so.7 #15 0x002f586d in ber_sockbuf_free () from /usr/lib/liblber-2.2.so.7 #16 0x00a418e8 in ldap_ld_free () from /usr/lib/libldap-2.2.so.7 #17 0x00a41b16 in ldap_unbind_ext () from /usr/lib/libldap-2.2.so.7 #18 0x00a41c60 in ldap_unbind_s () from /usr/lib/libldap-2.2.so.7 #19 0x0812099f in _close_ldap_link (rsrc=0xb7fab080) at /usr/src/php- 5.2.3/ext/ldap/ldap.c:200 #20 0x08290781 in list_entry_destructor (ptr=0xb7fab080) at /usr/src/php-5.2.3/Zend/zend_list.c:184 #21 0x0828e409 in zend_hash_del_key_or_index (ht=0x84066e0, arKey=0x0, nKeyLength=0, h=4, flag=1) at /usr/src/php-5.2.3/Zend/zend_hash.c:497 #22 0x0829051c in _zend_list_delete (id=4) at /usr/src/php- 5.2.3/Zend/zend_list.c:58 #23 0x08279799 in _zval_ptr_dtor (zval_ptr=0xb7faa128) at /usr/src/php-5.2.3/Zend/zend_variables.h:35 #24 0x0828f750 in zend_hash_apply_deleter (ht=0x8406650, p=0xb7faa11c) at /usr/src/php-5.2.3/Zend/zend_hash.c:611 #25 0x0828f7eb in zend_hash_graceful_reverse_destroy (ht=0x8406650) at /usr/src/php-5.2.3/Zend/zend_hash.c:646 #26 0x08279dfa in shutdown_executor () at /usr/src/php- 5.2.3/Zend/zend_execute_API.c:239 #27 0x08286354 in zend_deactivate () at /usr/src/php- 5.2.3/Zend/zend.c:860 #28 0x0824f058 in php_request_shutdown (dummy=0x0) at /usr/src/php- 5.2.3/main/main.c:1317 #29 0x08300b5f in main (argc=2, argv=0xbfe04c74) at /usr/src/php- 5.2.3/sapi/cli/php_cli.c:1319 -- Edit this bug report at http://bugs.php.net/?id=42105&edit=1
#42111 [Opn]: copy() does unexpected creation of file for dir as src but returns expecte FALSE
ID: 42111 User updated by: mahesh dot vemula at in dot ibm dot com -Summary: copy() does unexpected creation of file for dir as src & returns FALSE as expec Reported By: mahesh dot vemula at in dot ibm dot com Status: Open Bug Type: Scripting Engine problem Operating System: RHEL4 PHP Version: 5CVS-2007-07-26 (CVS) New Comment: Changed the Summary to make precise. Previous Comments: [2007-07-26 13:40:50] mahesh dot vemula at in dot ibm dot com Description: While trying to create a copy of an existing dir by copy() function, it creates a file which is not expected but returns FALSE as expected. Even for an existing file as second argument, PHP doesnt throw any warning message. It happens against Linux, and works fine against Windows. Reproduce code: --- Expected result: Creation of file is not expected and a required warning messages are expected. Actual result: -- Warning: copy(copy1): failed to open stream: Is a directory in %s on line %d bool(false) Warning: copy(copy): failed to open stream: Is a directory in %s on line %d bool(false) bool(false) bool(false) bool(false) -- Edit this bug report at http://bugs.php.net/?id=42111&edit=1
#42060 [Fbk->Opn]: [PATCH] Add pagedResults support and more (PAT18 and PAT19 updated for 5.2.3)
ID: 42060 User updated by: iarenuno at eteo dot mondragon dot edu Reported By: iarenuno at eteo dot mondragon dot edu -Status: Feedback +Status: Open Bug Type: LDAP related Operating System: Any PHP Version: 5.2.3 Assigned To: jani New Comment: I'll have a look at the issues you mention and will be back in a couple of days. Saludos. Iñaki. Previous Comments: [2007-07-24 15:02:00] [EMAIL PROTECTED] Some comments about the patch: 1) you need to make the patch apply to latest PHP _5_2 checkout instead of 5.2.3 sources. (I made some changes in there before I saw this report) 2) Do you really need to add so many functions for this stuff? And the naming of those functions isn't very intuitive either. 3) Separate the fixes from the new features. (first fix stuff then add new..) [2007-07-21 16:08:17] [EMAIL PROTECTED] New features are not added in bugfix releases so this'll have to wait til we start the 5.3 branch. [2007-07-21 15:52:48] iarenuno at eteo dot mondragon dot edu Description: I've taken Pierangelo Masarati's patches (PAT18 and PAT19) and have updated them to apply to 5.2.3 cleanly (as of today) and fixed a memory leak. In addition to it, I've added 4 test scripts based on the examples from Pierangelo, with a few modifications by me. I have tested this patch by building PHP with OpenLDAP 2.2.23 libraries (under Debian Sarge) and run the test scripts against both OpenLDAP 2.2.23 slapd server and MS Active Directory (runnning under W2K3 in W2K3 functional mode). OpenLDAP passes all the tests except passwordPolicy control extension (because it doesn't support it) and MS Active Directory passes only the pagedResult test (because it doesn't support the rest of the implemented controls for which tests exist). The patch is available at: http://www.eteo.mondragon.edu/descargas/php-ldap/php-ext-ldap-5.2.3.diff.txt.gz Could you please add this to the next stable PHP release? I badly need pagedResults control extension support in PHP :-) Saludos. Iñaki. -- Edit this bug report at http://bugs.php.net/?id=42060&edit=1
#42110 [NEW]: fgetcsv doesn't handle ""\n correctly in multiline csv record
From: figaroap at wp dot pl Operating system: Win XP SP2 PHP version: 6CVS-2007-07-26 (snap) PHP Bug Type: Filesystem function related Bug description: fgetcsv doesn't handle ""\n correctly in multiline csv record Description: The fgetcsv has some really strange behaviour under PHP6. When parsing a multi line record, if it begins with """ (one quote for enclosure and two quotes for an escaped quote within text) and just before the line break there is "", it will skip the beginning quote, add an empty array field, then output the 2nd line of the multi line csv record and you get some random empty fields in following records. The example attached clearly shows the problem described above. The code works as expected under PHP5. Reproduce code: --- test.php test.csv "A";"""Some long text"" some more";"1" "B";"""Hmm""";"2" Expected result: Array ( [0] => A [1] => "Some long text" some more [2] => 1 ) Array ( [0] => B [1] => "Hmm" [2] => 2 ) Actual result: -- Array ( [0] => A [1] => Some long text" [2] => [3] => some more" [4] => 1 [5] => ) Array ( [0] => B [1] => "Hmm" [2] => 2 ) -- Edit bug report at http://bugs.php.net/?id=42110&edit=1 -- Try a CVS snapshot (PHP 4.4): http://bugs.php.net/fix.php?id=42110&r=trysnapshot44 Try a CVS snapshot (PHP 5.2): http://bugs.php.net/fix.php?id=42110&r=trysnapshot52 Try a CVS snapshot (PHP 6.0): http://bugs.php.net/fix.php?id=42110&r=trysnapshot60 Fixed in CVS: http://bugs.php.net/fix.php?id=42110&r=fixedcvs Fixed in release: http://bugs.php.net/fix.php?id=42110&r=alreadyfixed Need backtrace: http://bugs.php.net/fix.php?id=42110&r=needtrace Need Reproduce Script:http://bugs.php.net/fix.php?id=42110&r=needscript Try newer version:http://bugs.php.net/fix.php?id=42110&r=oldversion Not developer issue: http://bugs.php.net/fix.php?id=42110&r=support Expected behavior:http://bugs.php.net/fix.php?id=42110&r=notwrong Not enough info: http://bugs.php.net/fix.php?id=42110&r=notenoughinfo Submitted twice: http://bugs.php.net/fix.php?id=42110&r=submittedtwice register_globals: http://bugs.php.net/fix.php?id=42110&r=globals PHP 3 support discontinued: http://bugs.php.net/fix.php?id=42110&r=php3 Daylight Savings: http://bugs.php.net/fix.php?id=42110&r=dst IIS Stability:http://bugs.php.net/fix.php?id=42110&r=isapi Install GNU Sed: http://bugs.php.net/fix.php?id=42110&r=gnused Floating point limitations: http://bugs.php.net/fix.php?id=42110&r=float No Zend Extensions: http://bugs.php.net/fix.php?id=42110&r=nozend MySQL Configuration Error:http://bugs.php.net/fix.php?id=42110&r=mysqlcfg
#42093 [Opn->Bgs]: php5ts.dll causes the IIS application pool to crash
ID: 42093 Updated by: [EMAIL PROTECTED] Reported By: ailene dot nichol at tandberg dot com -Status: Open +Status: Bogus Bug Type: IIS related Operating System: Windows Server 2003 SP2 PHP Version: 5.2CVS-2007-07-24 New Comment: We are aware of PHP's problems with stability under IIS and are working to rectify the problem. Unfortunatly your bug report does not contain any extra useful information and we already have enough bug reports open about this issue. If you can provide more detailed information such as a reproducable crash or a backtrace please do so and reopen this bug. Otherwise please keep trying new releases as we are working to resolve the problems on this platform Thanks for your interest in PHP. Previous Comments: [2007-07-25 03:40:21] ailene dot nichol at tandberg dot com Description: I have a script that does digest authentication. The script works as expected and the page will load correctly, but as soon as I run this script, the IIS default application pool will crash when requesting any other page. Occasionally I see in the Event Logs that the application pool crashes with other scripts, but with the digest authentication it is always reproducible. I have also tried the latest php found in php5.2-win32-200707241230.zip and can still produce the crash. Reproduce code: --- // This is the guts of the digest authentication code. It is all taken from samples on php.net. if (isset($headers['AUTHORIZATION'])) { if($data = http_digest_parse($headers['AUTHORIZATION'])) { $A1 = md5($user . ':' . $realm . ':' . $pwd); $A2 = md5($_SERVER['REQUEST_METHOD'].':'.$data['uri']); $valid_response = md5($A1.':'.$data['nonce'].':'.$data['nc'].':'.$data['cnonce'].':'.$data['qop'].':'.$A2); if ($data['response'] == $valid_response) { $_SERVER['AUTH_USER'] = $data['username']; return 0; } } } header('HTTP/1.1 401 Unauthorized'); header('WWW-Authenticate: Digest realm="' . $realm . '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"'); Actual result: -- FAULTING_IP: php5ts!_zend_mm_free_int+66 [Zend\zend_alloc.c @ 1921] 020ea9d6 8a0437 mov al,byte ptr [edi+esi] EXCEPTION_RECORD: -- (.exr ) ExceptionAddress: 020ea9d6 (php5ts!_zend_mm_free_int+0x0066) ExceptionCode: c005 (Access violation) ExceptionFlags: NumberParameters: 2 Parameter[0]: Parameter[1]: 06b8d148 Attempt to read from address 06b8d148 DEFAULT_BUCKET_ID: APPLICATION_FAULT PROCESS_NAME: w3wp.exe ERROR_CODE: (NTSTATUS) 0xc005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". READ_ADDRESS: 06b8d148 BUGCHECK_STR: ACCESS_VIOLATION LAST_CONTROL_TRANSFER: from 020ebad9 to 020ea9d6 STACK_TEXT: 00f7e68c 020ebad9 02edb0b0 02edb168 02196397 php5ts!_zend_mm_free_int+0x66 [Zend\zend_alloc.c @ 1921] 00f7e71c 77f76bfa 77f76c2f 00f7e860 8000 php5ts!_efree+0x39 [Zend\zend_alloc.c @ 2254] 00f7f90c 10002128 0105f8b8 5a3211a0 advapi32!LocalBaseRegOpenKey+0xe9 00f7fe04 5a322991 0105f8b8 0105e5f8 0105f248 php5isapi!HttpExtensionProc+0x348 [sapi\isapi\php5isapi.c @ 917] 00f7fe24 5a3968ff 0105f828 10001de0 00f7fe50 w3isapi!ProcessIsapiRequest+0x214 00f7fe58 5a3967e0 0105e5f8 w3core!W3_ISAPI_HANDLER::IsapiDoWork+0x3fd 00f7fe78 5a396764 00f7fee8 0105e5f8 w3core!W3_ISAPI_HANDLER::DoWork+0xb0 00f7fe98 5a3966f4 0105e5f8 00f7fec4 w3core!W3_HANDLER::MainDoWork+0x16e 00f7fea8 5a3966ae 0105e600 0105e5f8 0001 w3core!W3_CONTEXT::ExecuteCurrentHandler+0x53 00f7fec4 5a396648 0001 00f7fee8 0026b480 w3core!W3_CONTEXT::ExecuteHandler+0x51 00f7feec 5a392264 w3core!W3_STATE_HANDLE_REQUEST::DoWork+0x9a 00f7ff10 5a3965ea w3core!W3_MAIN_CONTEXT::DoWork+0xa6 00f7ff2c 5a36169f 0105db30 0105db30 5a361650 w3core!W3_MAIN_CONTEXT::OnNewRequest+0x55 00f7ff38 5a361650 00268838 00268844 00f7ff5c w3dt!UL_NATIVE_REQUEST::DoStateProcess+0x48 00f7ff48 5a3616ca 02d4 0105db34 w3dt!UL_NATIVE_REQUEST::DoWork+0x7f 00f7ff5c 5a3024ce 02d4 0105db34 w3dt!OverlappedCompletionRoutine+0x1a 00f7ff8c 5a3026ac 002688b0 5a30 w3tp!THREAD_POOL_DATA::ThreadPoolThread+0x73 00f7ffa0 5a301da9 00268838 w3tp!THREAD_POOL_DATA::ThreadPoolThread+0x24 00f7ffb8 77e64829 002688b0 w3tp!THREAD_MANAGER::ThreadManagerThread+0x39 00f7ffec 5a301d70 002688b0 kernel32!BaseThreadStart+0x34 STACK_COMMAND: ~3s; .ecxr ; kb FAULTING_THREAD: 0498 FOLLOWUP_IP: php5ts!_zend_mm_free_int+66 [Zend\zend_alloc.c @ 1921] 020ea9d6 8a043
#42089 [Opn->Fbk]: erro blob firebird php
ID: 42089 Updated by: [EMAIL PROTECTED] Reported By: anita dot sobreira at gmail dot com -Status: Open +Status: Feedback Bug Type: InterBase related Operating System: fedora 6 PHP Version: 5.2.3 New Comment: Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi Previous Comments: [2007-07-24 16:00:31] anita dot sobreira at gmail dot com Description: error in make test and after error in blob with php 5.2.3 and firebird i test with php 5.2.2 , 5.2.1 firebirdCS 1.5 and 2.0 ever a have the same error i am use fedora 6 i test in red hat entreprise 4 and i have the same error my selinux is disabled Reproduce code: --- when i did the "make test" it show this error = FAILED TEST SUMMARY - double to string conversion tests [Zend/tests/double_to_string.phpt] Bug #16069 (ICONV transliteration failure) [ext/iconv/tests/bug16069.phpt] iconv stream filter [ext/iconv/tests/iconv_stream_filter.phpt] InterBase: connect, close and pconnect [ext/interbase/tests/002.phpt] InterBase: misc sql types (may take a while) [ext/interbase/tests/003.phpt] InterBase: BLOB test [ext/interbase/tests/004.phpt] InterBase: transactions [ext/interbase/tests/005.phpt] InterBase: binding (may take a while) [ext/interbase/tests/006.phpt] InterBase: array handling [ext/interbase/tests/007.phpt] InterBase: event handling [ext/interbase/tests/008.phpt] Bug #22414 (passthru() does not read data correctly) [ext/standard/tests/file/bug22414.phpt] strripos() offset integer overflow [ext/standard/tests/strings/strripos_offset.phpt] XMLWriter: libxml2 XML Writer, Elements & Attributes [ext/xmlwriter/tests/007.phpt] XMLWriter: libxml2 XML Writer, Elements & Attributes [ext/xmlwriter/tests/OO_007.phpt] = after when i test with php page I had this warning Warning: ibase_blob_info() [function.ibase-blob-info]: invalid BLOB ID in /var/www/html/internet/intranet/novo/marketing/solVisualizar.php on line 143 Warning: ibase_blob_open() [function.ibase-blob-open]: invalid BLOB ID in /var/www/html/internet/intranet/novo/marketing/solVisualizar.php on line 144 Warning: ibase_blob_get(): supplied argument is not a valid Interbase blob resource in /var/www/html/internet/intranet/novo/marketing/solVisualizar.php on line 146 Warning: ibase_blob_close(): supplied argument is not a valid Interbase blob resource in /var/www/html/internet/intranet/novo/marketing/solVisualizar.php on line 148 my configure is this ./configure --with-apxs2=/usr/local/apache2/bin/apxs --with-mysql=/usr/lib/mysql --with-interbase=/opt/firebird --with-jpeg-dir=/usr --enable-sockets --prefix=/usr --sysconfdir=/etc/php --with-mod_charset --localstatedir=/var --with-config-file-path=/etc/php --with-config-file-scan-dir=/etc/php --disable-debug --enable-pic --enable-dbase --disable-rpath --enable-inline-optimization --with-bz2 --with-db4 --with-curl --with-freetype-dir=/usr --enable-gd-native-ttf --without-gdbm --with-gettext --without-gmp --with-iconv --with-openssl --with-pspell --with-xml --with-expat-dir=/usr --with-zlib --with-layout=GNU --enable-bcmath --enable-exif --enable-ftp --enable-magic-quotes --enable-safe-mode --enable-sockets --enable-shmop --enable-sysvmsg --enable-track-vars --enable-trans-sid --disable-yp --enable-wddx --with-pear --enable-memory-limit --enable-calendar --enable-dbx --enable-dio --with-mime-magic --with-pgsql=/usr/local/pgsql --enable-embed --with-readline --enable-gd-jis-conv --enable-fastcgi --enable-discard-path --enable-force-cgi-redirect --enable-dba --with-gd --with-jpeg-dir=/usr --with-png-dir=/usr --prefix=/usr/local/apache2/php --with-config-file-path=/usr/local/apache2/php -with-z=/usr/include/linux i don´t know what to do with this i am crazy with this help me please -- Edit this bug report at http://bugs.php.net/?id=42089&edit=1
#42094 [Opn->Bgs]: getenv("REMOTE_ADDR") returns no IP address
ID: 42094 Updated by: [EMAIL PROTECTED] Reported By: fushimi at rep dot fielding dot nec dot co dot jp -Status: Open +Status: Bogus Bug Type: Apache2 related Operating System: Windows 2000 PHP Version: 5.2.3 New Comment: It's apache that isn't setting it. PHP only sets the variables to whatever the server says they are. No bug in PHP. Previous Comments: [2007-07-26 00:48:12] fushimi at rep dot fielding dot nec dot co dot jp Thank you, to reply me so quickly. Yes, $_SERVER['REMOTE_ADDR'] return the right IP address. One more thing that I forgot to mention, my Http server is Apache version 2.2.4. To help you, below is the results of PHP variable using phpinfo(): PHP5.2.3 and Apache2.2.4 _SERVER["SERVER_ADDR"] 192.168.1.3 _SERVER["SERVER_PORT"] 80 _SERVER["REMOTE_ADDR"] 0.0.0.0 _SERVER["REMOTE_PORT"] 0 PHP5.1.2 and Apache2.0.59 = _SERVER["SERVER_ADDR"] 192.168.1.2 _SERVER["SERVER_PORT"] 80 _SERVER["REMOTE_ADDR"] 192.168.1.1 _SERVER["REMOTE_PORT"] 2476 [2007-07-25 11:58:27] [EMAIL PROTECTED] Does it show up in $_SERVER['REMOTE_ADDR'] ?? [2007-07-25 07:53:25] fushimi at rep dot fielding dot nec dot co dot jp Description: I am evaluating the newest PHP 5.2.3, in relation with my current PHP 5.1.2. So, when I tried to get the remote IP using getenv(REMOTE_ADDR), I obtained the following results: PHP 5.2.3 => return 0.0.0.0 PHP 5.1.2 => return 192.168.1.1 PHP in ISAPI mode. Reproduce code: --- $ip = getenv("REMOTE_ADDR"); echo "IP Address : ".$ip; Expected result: IP Address : 192.168.1.1 Actual result: -- IP Address : 0.0.0.0 -- Edit this bug report at http://bugs.php.net/?id=42094&edit=1
#42109 [Opn->Fbk]: frequent call file_exists() function
ID: 42109 Updated by: [EMAIL PROTECTED] Reported By: dailu at mail dot ru -Status: Open +Status: Feedback Bug Type: Filesystem function related Operating System: Windows XP SP2 PHP Version: 5.2.3 New Comment: Not enough information was provided for us to be able to handle this bug. Please re-read the instructions at http://bugs.php.net/how-to-report.php If you can provide more information, feel free to add it to this bug and change the status back to "Open". Thank you for your interest in PHP. Previous Comments: [2007-07-26 05:45:42] dailu at mail dot ru Description: frequent call file_exists() function Reproduce code: --- $db -> Query('SELECT `fullpath` FROM `files`); $files = $db -> FetchAllRows(); foreach($files as $f) file_exists($files); echo 'Complete'; Expected result: Complete Actual result: -- If files is not existed and theirs number more than 5, php is not show 'Complete'. If files is existed php show 'complete'. -- Edit this bug report at http://bugs.php.net/?id=42109&edit=1
#42108 [Opn->Bgs]: utf8_mime2text() has new signature, but U8T_CANONICAL is missing
ID: 42108 Updated by: [EMAIL PROTECTED] Reported By: sahengala at yahoo dot com -Status: Open +Status: Bogus Bug Type: IMAP related Operating System: Red Hat Enterprise Linux ES rele PHP Version: 5.2.3 New Comment: Okay, marking it bogus then. Previous Comments: [2007-07-26 02:55:22] sahengala at yahoo dot com I have been able to fix this. I re-did all the steps with a fresh compile. Sorry for bugging :) - Keep up the good work. I had issue in between with compiling imap, had to install the pam-devel. Used command: $ up2date pam-devel or $ yum list available | grep -i openssl. and $ yum install openssl.i386 to install it. Well hope u all have an easy time fixing issues. [2007-07-26 02:31:50] sahengala at yahoo dot com Description: As required I have downloaded imap and installed in: /usr/local/imap-2006j (completed all the steps mentioned in: http://www.php.net/imap - 07-Jul-2007 06:41 except deleting the files from the folder) I tried to install php with the following configure options: ./configure --prefix=/usr/local/php-5.2.3 --with-apxs2=/usr/local/apache2/bin/apxs --with-mysql=/usr/lib/mysql --with-libxml-dir=/usr/local/libxml2 --with-imap=/usr/local/imap-2006j --with-imap-ssl=/usr/include/openssl --enable-static=no The following error is displayed: configure: error: utf8_mime2text() has old signature, but U8T_CANONICAL is present. This should not happen. Check config.log for additional information. Expected result: should configure without any errors. Actual result: -- In config.log the last 5 lines are: configure:45747: checking if your cpp allows macro usage in include lines configure:45759: gcc -c -I/usr/include -g -O2 conftest.c 1>&5 configure:46103: checking for IMAP support configure:46149: checking for IMAP Kerberos support configure:46174: checking for IMAP SSL support configure:46590: checking for utf8_mime2text signature configure:46608: gcc -c -I/usr/local/imap-2006j/include conftest.c 1>&5 configure:46637: checking for U8T_CANONICAL configure:46653: gcc -c -I/usr/local/imap-2006j/include conftest.c 1>&5 -- Edit this bug report at http://bugs.php.net/?id=42108&edit=1