Test: /ext/standard/tests/serialize/bug71311.phpt - Version 7.2.34        

Security #71311 Use-after-free vulnerability in SPL(ArrayObject, unserialize)
Submitted: 2016-01-08 13:34:55 Modified: 2016-02-02 05:20:01
From: sean.heelan Assigned: stas
Status: Closed Package: SPL related
PHP Version: 7.* OS: Ubuntu 15.10

There is 1 diff reported by users for this test.

Count Diff
1 (100%)
001+ Notice: unserialize(): Error at offset 23 of 35 bytes in %s/bug71311.php on line 2
002+ bool(false)
001- Fatal error: Uncaught UnexpectedValueException: Error at offset 10 of 11 bytes in %s%ebug71311.php:2
002- Stack trace:
003- #0 [internal function]: ArrayObject->unserialize('x:i:0;r:3;X')
004- #1 %s%ebug71311.php(2): unserialize('%s')
005- #2 {main}
006- thrown in %s%ebug71311.php on line 2