Edit report at http://bugs.php.net/bug.php?id=51008&edit=1

 ID:                 51008
 Updated by:         cataphr...@php.net
 Reported by:        geissert at debian dot org
 Summary:            Zend/tests/bug45877.phpt fails
 Status:             Open
 Type:               Bug
 Package:            Scripting Engine problem
 Operating System:   debian sid
 PHP Version:        5.3SVN-2010-02-12
-Assigned To:        
+Assigned To:        dmitry
 Block user comment: N

 New Comment:

See also http://bugs.gentoo.org/show_bug.cgi?id=338280 and
http://bugs.php.net/bug.php?id=52899



The current implementation relies on undefined behavior and apparently
the overflow check can be optimized away.


Previous Comments:
------------------------------------------------------------------------
[2010-03-06 20:02:57] geiss...@php.net

Reopening it because somebody with commit access to the engine needs to
apply and commit the patch there. The other patch can be found at

http://git.debian.org/?p=pkg-php/php.git;a=blob;f=debian/patches/zend_int_overflow.patch;hb=0fe497525d46b2fa8353e37106b47c05ef804cc5

------------------------------------------------------------------------
[2010-02-23 13:05:16] j...@php.net

Duplicate.

------------------------------------------------------------------------
[2010-02-22 23:47:30] geiss...@php.net

Indeed. I just checked with the -O0 build and it passes.



The affected code in this case is ZEND_HANDLE_NUMERIC in
Zend/zend_hash.h



Should this one be assigned to somebody in particular?

------------------------------------------------------------------------
[2010-02-22 18:05:08] sni...@php.net

Possibly same issue as bug #51023 ??

------------------------------------------------------------------------
[2010-02-12 18:58:42] geissert at debian dot org

It fails for me with 5.3.1 on i686, ia64, s390, alpha, powerpc, x86_64,
etc. Even on those running kfreebsd.

It also fails with the latest 5.3 svn on ia64 (haven't built it on any
other arch.)

------------------------------------------------------------------------


The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

    http://bugs.php.net/bug.php?id=51008


-- 
Edit this bug report at http://bugs.php.net/bug.php?id=51008&edit=1

Reply via email to