[Bug 387963] Re: pam_auth: ALERT - canary mismatch on efree() - heap overflow detected
Gregory Colpart (evolix)
reg at evolix.fr
Mon Jul 20 23:44:19 UTC 2009
Hello,
Bug is in arguments handling:
--8<--
cnt = ARG_COUNT(ht);
switch (cnt) {
case 2:
if (zend_get_parameters_ex(2, &username, &password)==FAILURE) {
RETURN_FALSE;
}
break;
case 3:
if (zend_get_parameters_ex(3, &username, &password, &status) == FAILURE) {
RETURN_FALSE;
}
if (!PZVAL_IS_REF(*status)) {
php_error(E_WARNING, "Error variable must be passed by reference");
RETURN_FALSE;
}
pval_destructor(*status);
break;
default:
WRONG_PARAM_COUNT;
break;
}
--8<--
Dirty workarounds :
- don't use third args. use only two args.
- Comment "pval_destructor(*status);" line and rebuild the package.
--
pam_auth: ALERT - canary mismatch on efree() - heap overflow detected
https://bugs.launchpad.net/bugs/387963
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs at lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
More information about the universe-bugs
mailing list