Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:44500 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 71647 invoked from network); 26 Jun 2009 23:17:05 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 Jun 2009 23:17:05 -0000 Authentication-Results: pb1.pair.com smtp.mail=pierre.php@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=pierre.php@gmail.com; sender-id=pass; domainkeys=bad Received-SPF: pass (pb1.pair.com: domain gmail.com designates 72.14.220.159 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: pierre.php@gmail.com X-Host-Fingerprint: 72.14.220.159 fg-out-1718.google.com Received: from [72.14.220.159] ([72.14.220.159:31277] helo=fg-out-1718.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 75/EB-08868-FE6554A4 for ; Fri, 26 Jun 2009 19:17:04 -0400 Received: by fg-out-1718.google.com with SMTP id e12so752563fga.0 for ; Fri, 26 Jun 2009 16:17:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=deqJpySGLcnhhMtctFyuucsi8VaEkbpDuICUMfCDh20=; b=DqK0DldcsofVNXwDH8Qphwt3H8Ruz8MGfODolqLiTcR7VYfJ07J/QsFZNx8v4/xmk9 GGAy7Jc1XbVSOAGGw/KY3MC0cr92noSp8eOONS+/1vJss7/+z7c/g+nKqssLtgXgpIWT 9PbZ/hjd/CFbcQhJJlp6/JPI5RN+hUO0mVXAc= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=oeDuAGTGUvuUlCBBk8G8k6gJtJoqDZT+6HCoJTsYzfOFoh8RTh+wiC+ChuRN6NW3Af peAJF/j5qkumdTucCgq9N9hcMidiZJ4QAcFHLIFfGxnilcQgyHR6nXel8Afgbe8JbI3H 6nOoEGexp1vdcZ61/rTTr3VXhZa6ZMY3Nxs0A= MIME-Version: 1.0 Received: by 10.86.1.18 with SMTP id 18mr4149234fga.19.1246058220994; Fri, 26 Jun 2009 16:17:00 -0700 (PDT) In-Reply-To: <4A454886.9070203@gravitonic.com> References: <4A453C43.3060806@gravitonic.com> <4A45450D.4060505@zend.com> <4A454886.9070203@gravitonic.com> Date: Sat, 27 Jun 2009 01:17:00 +0200 Message-ID: To: Andrei Zmievski Cc: Stanislav Malyshev , PHP internals Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] Memory corruption bug From: pierre.php@gmail.com (Pierre Joye) 5.2 is already released so you can commit anyway. For 5.3, I'm not sure (well I am), but wait until Johannes and Lukas are back online please. On Sat, Jun 27, 2009 at 12:15 AM, Andrei Zmievski wrote: > Stanislav Malyshev wrote: >> >> You just did safe_address in _safe_malloc(nmemb, len, 0) which should have >> called E_ERROR if nmemb*len overflows, so do you need to do it again? >> Leaving a comment about it wouldn't hurt though :) > > Yeah, you're right, but I didn't write the code. :) Regardless, I think this > fix should go into 5.2/5.3 because calloc() advertises memory clearing as > part of its API contract. > > -Andrei > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > -- Pierre http://blog.thepimp.net | http://www.libgd.org