PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for ext/fileinfo/tests/cve-2014-3538.phpt ('Bug #66731: file: extensive backtraking')

Script

1: <?php
2: $fd 
__DIR__.'/cve-2014-3538.data';
3:
4:
file_put_contents($fd,
5:   
'try:' .
6:   
str_repeat("\n"1000000));
7:
8:
$fi finfo_open(FILEINFO_NONE);
9:
$t microtime(true);
10:
var_dump(finfo_file($fi$fd));
11:
$t microtime(true) - $t;
12:
finfo_close($fi);
13: if (
$t 1) {
14:     echo 
"Ok\n";
15: } else {
16:     
printf("Failed, time=%.2f\n"$t);
17: }
18:
19:
?>
20:
Done
21:

Report

==10826== Conditional jump or move depends on uninitialised value(s)
==10826==    at 0x413A134: ???
==10826==    by 0x169957BF: ???
==10826==    by 0x169957BF: ???
==10826==    by 0x169957D6: ???
==10826==    by 0x1FFEFFB9DF: ???
==10826==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10826== 
==10826== Conditional jump or move depends on uninitialised value(s)
==10826==    at 0x4137C34: ???
==10826==    by 0x169C814F: ???
==10826==    by 0x169C814F: ???
==10826==    by 0x169C8166: ???
==10826==    by 0x1FFEFFB9DF: ???
==10826==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10826== 
==10826== Conditional jump or move depends on uninitialised value(s)
==10826==    at 0x41362D4: ???
==10826==    by 0x169EB1DF: ???
==10826==    by 0x169EB1DF: ???
==10826==    by 0x169EF1DD: ???
==10826==    by 0x1FFEFFB9DF: ???
==10826==    by 0x10AC63B: zend_is_executing (zend_execute_API.c:525)
==10826== 

 

Generated at Sat, 09 Sep 2017 03:10:54 +0000 (14 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.