ID: 40624
User updated by: test_junk at hotmail dot it
Reported By: test_junk at hotmail dot it
-Status: Feedback
+Status: Open
Bug Type: PCRE related
Operating System: linux 2.4 i386
PHP Version: 4.4.5
New Comment:
Is this issue going to be fixed in the next release? Unfortunately it
breaks lots of things, including very popular apps. I will try to do my
best in finding the responsible php code but I'm not sure it will be
possibile.
Thanks for your interest in this matter.
Previous Comments:
------------------------------------------------------------------------
[2007-02-28 00:13:38] [EMAIL PROTECTED]
Yup, it does look like a stack overflow (which is a known issue in
PCRE), though we would appreciate a test case anyway.
------------------------------------------------------------------------
[2007-02-27 23:39:19] test_junk at hotmail dot it
I couldn't isolate the code yet. However the full backtrace is the
following (I ran the same app twice):
1st time:
#0 0x081851f2 in match (eptr=0x61737361 <Address 0x61737361 out of
bounds>,
ecode=0x2c69746c <Address 0x2c69746c out of bounds>,
offset_top=1919250464, md=0x7474656d,
ims=1868852837, eptrb=0x736f6320, flags=1629531331,
rdepth=1702192160)
at /sources/php/php-4.4.6/ext/pcre/pcrelib/pcre_exec.c:2209
#1 0x00000000 in ?? ()
2nd time:
#0 0x0818257f in match (eptr=0x61737361 <Address 0x61737361 out of
bounds>,
ecode=0x2c69746c <Address 0x2c69746c out of bounds>,
offset_top=1919250464, md=0x7474656d,
ims=1868852837, eptrb=0x736f6320, flags=1629531331,
rdepth=1702192160)
at /sources/php/php-4.4.6/ext/pcre/pcrelib/pcre_exec.c:1071
Cannot access memory at address 0xbf7ffff0
------------------------------------------------------------------------
[2007-02-26 14:00:30] [EMAIL PROTECTED]
also please post the whole backtrace, so that we can see what's
happening (it may be just a stack overflow..)
------------------------------------------------------------------------
[2007-02-26 08:58:27] [EMAIL PROTECTED]
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves.
A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external
resources such as databases, etc. If the script requires a
database to demonstrate the issue, please make sure it creates
all necessary tables, stored procedures etc.
Please avoid embedding huge scripts into the report.
------------------------------------------------------------------------
[2007-02-26 00:24:41] test_junk at hotmail dot it
This snapshot is identical to the one I tested as far as I am seeing
comparing the 2 archives, however which files did you modify?
The only way I have to trigger this bug is recompiling the engine on a
production server but since it breaks several websites (Drupal seems to
be most affected) I can do it only at night so I can perform a limited
number of attempts.
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/40624
--
Edit this bug report at http://bugs.php.net/?id=40624&edit=1