Cristian Rodriguez schrieb: >> Here is the patch I created in approximately half an hour. A solution to >> a problem > >> that is *NOT* fixable at the moment, according to Stanislav. > > at openSUSE, we also have a patch for this issue since a few weeks, as > a vendor unfortunately we have to take care of things that people > here dont want to fix... > > http://www.flyspray.org/patches/MOPB-01-abicompatible.patch.bz2 > I only see one major problem with this patch. You just call zend_error() when a possible integer overflow is detected. This is however not really safe. Refcount increases etc... are usually done deep in the engine and it is not ensured that in case of a bailout this cannot result in destruction of structures that were only partialy initialised.
Stefan Esser -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php