Test: /ext/session/tests/bug72562.phpt - Version 7.2.0-dev        

Security #72562 Use After Free in unserialize() with Unexpected Session Deserialization
Submitted: 2016-07-08 02:50:04 Modified: 2016-07-25 15:18:04
From: taoguangchen Assigned: stas
Status: Closed Package: Session related
PHP Version: 5.5.37 OS:

There is 1 diff reported by users for this test.

Count Diff
38 (100%)
001+ Fatal error: Uncaught Exception: Could not gather sufficient random data in %s/bug72562.php:4
002+ Stack trace:
003+ #0 %s/bug72562.php(4): session_start()
004+ #1 {main}
001- Warning: session_decode(): Failed to decode session object. Session has been destroyed in %s%ebug72562.php on line %d
003- Notice: unserialize(): Error at offset 0 of 1 bytes in %s%ebug72562.php on line %d
005- Notice: unserialize(): Error at offset 4 of 4 bytes in %s%ebug72562.php on line %d
006- bool(false)
006+ Next Exception: Could not gather sufficient random data in %s/bug72562.php:4
007+ Stack trace:
008+ #0 %s/bug72562.php(4): session_start()
009+ #1 {main}
010+
011+ Next Exception: Could not gather sufficient random data in %s/bug72562.php:4
012+ Stack trace:
013+ #0 %s/bug72562.php(4): session_start()
014+ #1 {main}
015+
016+ Next Exception: Could not gather sufficient random data in %s/bug72562.php:4
017+ Stack trace:
018+ #0 %s/bug72562.php(4): session_start()
019+ #1 {main}
021+ Next Error: Failed to create session ID: files (path: ) in %s/bug72562.php:4
022+ Stack trace:
023+ #0 %s/bug72562.php(4): session_start()
024+ #1 {main}
025+ thrown in %s/bug72562.php on line 4