Test: /ext/session/tests/bug72681.phpt - Version 7.2.0-dev        

Security #72681 PHP Session Data Injection Vulnerability
Submitted: 2016-07-26 16:34:53 Modified: 2016-09-05 15:28:13
From: taoguangchen Assigned: stas
Status: Closed Package: Session related
PHP Version: 5.6.23 OS:

There is 1 diff reported by users for this test.

Count Diff
38 (100%)
001+ Fatal error: Uncaught Exception: Could not gather sufficient random data in %s/bug72681.php:3
002+ Stack trace:
003+ #0 %s/bug72681.php(3): session_start()
004+ #1 {main}
005+
006+ Next Exception: Could not gather sufficient random data in %s/bug72681.php:3
001- array(0) {
002- }
003- array(1) {
004- ["ryat"]=>
005- string(24) "ryat|O:8:"stdClass":0:{}"
006- }
007+ Stack trace:
008+ #0 %s/bug72681.php(3): session_start()
009+ #1 {main}
010+
011+ Next Exception: Could not gather sufficient random data in %s/bug72681.php:3
012+ Stack trace:
013+ #0 %s/bug72681.php(3): session_start()
014+ #1 {main}
015+
016+ Next Exception: Could not gather sufficient random data in %s/bug72681.php:3
017+ Stack trace:
018+ #0 %s/bug72681.php(3): session_start()
019+ #1 {main}
020+
021+ Next Error: Failed to create session ID: files (path: ) in %s/bug72681.php:3
022+ Stack trace:
023+ #0 %s/bug72681.php(3): session_start()
024+ #1 {main}
025+ thrown in %s/bug72681.php on line 3