PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for ext/fileinfo/tests/cve-2014-3538-mb.phpt ('Bug #66731: file: extensive backtraking')

Script

1: <?php
2: $fd 
__DIR__.'/cve-2014-3538私はガラスを食べられます.data';
3:
4:
file_put_contents($fd,
5:   
'try:' .
6:   
str_repeat("\n"1000000));
7:
8:
$fi finfo_open(FILEINFO_NONE);
9:
$t microtime(true);
10:
var_dump(finfo_file($fi$fd));
11:
$t microtime(true) - $t;
12:
finfo_close($fi);
13: if (
$t 1) {
14:     echo 
"Ok\n";
15: } else {
16:     
printf("Failed, time=%.2f\n"$t);
17: }
18:
19:
?>
20:
Done
21:

Report

==10820== Conditional jump or move depends on uninitialised value(s)
==10820==    at 0x413A134: ???
==10820==    by 0x169958FF: ???
==10820==    by 0x169958FF: ???
==10820==    by 0x16995916: ???
==10820==    by 0x1FFEFFB9DF: ???
==10820==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10820== 
==10820== Conditional jump or move depends on uninitialised value(s)
==10820==    at 0x4137C34: ???
==10820==    by 0x169C828F: ???
==10820==    by 0x169C828F: ???
==10820==    by 0x169C82A6: ???
==10820==    by 0x1FFEFFB9DF: ???
==10820==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10820== 
==10820== Conditional jump or move depends on uninitialised value(s)
==10820==    at 0x41362D4: ???
==10820==    by 0x169EB31F: ???
==10820==    by 0x169EB31F: ???
==10820==    by 0x169EF31D: ???
==10820==    by 0x1FFEFFB9DF: ???
==10820==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10820== 

 

Generated at Sat, 09 Sep 2017 03:10:54 +0000 (14 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.