ID: 44159 Updated by: [EMAIL PROTECTED] Reported By: uwendel at mysql dot com -Status: Open +Status: Closed Bug Type: PDO related Operating System: Linux PHP Version: 5.3CVS-2008-02-18 (snap) New Comment:
This bug has been fixed in CVS. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. Previous Comments: ------------------------------------------------------------------------ [2008-02-18 19:33:44] uwendel at mysql dot com Description: ------------ You can make PDO crash by running $pdo->setAttribute(PDO::ATTR_STATEMENT_CLASS, NULL) . Reproduce code: --------------- [EMAIL PROTECTED]:~/php53> valgrind sapi/cli/php -r '$pdo=new PDO("sqlite:/tmp/foo.db"); var_dump($pdo->setAttribute(PDO::ATTR_STATEMENT_CLASS, NULL));' ==28915== Memcheck, a memory error detector. ==28915== Copyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et al. ==28915== Using LibVEX rev 1732, a library for dynamic binary translation. ==28915== Copyright (C) 2004-2007, and GNU GPL'd, by OpenWorks LLP. ==28915== Using valgrind-3.2.3, a dynamic binary instrumentation framework. ==28915== Copyright (C) 2000-2007, and GNU GPL'd, by Julian Seward et al. ==28915== For more details, rerun with: -v ==28915== ==28915== Invalid read of size 1 ==28915== at 0x4924BE: pdo_dbh_attribute_set (pdo_dbh.c:743) ==28915== by 0x492760: zim_PDO_setAttribute (pdo_dbh.c:826) ==28915== by 0x628683: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:190) ==28915== by 0x61A99A: execute (zend_vm_execute.h:91) ==28915== by 0x5EDFA2: zend_eval_string (zend_execute_API.c:1278) ==28915== by 0x5EE117: zend_eval_string_ex (zend_execute_API.c:1311) ==28915== by 0x686CEC: main (php_cli.c:1175) ==28915== Address 0x14 is not stack'd, malloc'd or (recently) free'd ==28915== ==28915== Process terminating with default action of signal 11 (SIGSEGV) ==28915== Access not within mapped region at address 0x14 ==28915== at 0x4924BE: pdo_dbh_attribute_set (pdo_dbh.c:743) ==28915== by 0x492760: zim_PDO_setAttribute (pdo_dbh.c:826) ==28915== by 0x628683: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:190) ==28915== by 0x61A99A: execute (zend_vm_execute.h:91) ==28915== by 0x5EDFA2: zend_eval_string (zend_execute_API.c:1278) ==28915== by 0x5EE117: zend_eval_string_ex (zend_execute_API.c:1311) ==28915== by 0x686CEC: main (php_cli.c:1175) ==28915== ==28915== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 1) ==28915== malloc/free: in use at exit: 2,571,202 bytes in 10,439 blocks. ==28915== malloc/free: 10,879 allocs, 440 frees, 2,888,407 bytes allocated. ==28915== For counts of detected errors, rerun with: -v ==28915== searching for pointers to 10,439 not-freed blocks. ==28915== checked 2,561,864 bytes. ==28915== ==28915== LEAK SUMMARY: ==28915== definitely lost: 0 bytes in 0 blocks. ==28915== possibly lost: 0 bytes in 0 blocks. ==28915== still reachable: 2,571,202 bytes in 10,439 blocks. ==28915== suppressed: 0 bytes in 0 blocks. ==28915== Rerun with --leak-check=full to see details of leaked memory. Speicherzugriffsfehler Expected result: ---------------- No crash. Return false, print warning on wrong argument type Actual result: -------------- Crash ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=44159&edit=1