Test: /ext/spl/tests/bug70366.phpt - Version 7.0.11-dev        

Security #70366 yet another use-after-free vulnerability in unserialize() with SplDoublyLinkedL
Submitted: 2015-08-27 10:49:43 Modified: 2015-09-09 10:08:11
From: taoguangchen Assigned: stas
Status: Closed Package: *General Issues
PHP Version: 5.6.12 OS: *

There is 1 diff reported by users for this test.

Count Diff
2 (100%)
001+ Segmentation fault (core dumped)
002+
003+ Termsig=11
001- array(5) {
002- [0]=>
003- int(1)
004- [1]=>
005- &int(1)
006- [2]=>
007- object(obj)#%d (1) {
008- ["ryat"]=>
009- &int(1)
010- }
011- [3]=>
012- array(1) {
013- [0]=>
014- int(1)
015- }
016- [4]=>
017- string(24) "%s"
018- }