[Tickets #11671] Re: The dynamic view crashes on some Inboxes

bugs at horde.org bugs at horde.org
Mon Nov 26 11:12:40 UTC 2012


DO NOT REPLY TO THIS MESSAGE. THIS EMAIL ADDRESS IS NOT MONITORED.

Ticket URL: http://bugs.horde.org/ticket/11671
------------------------------------------------------------------------------
  Ticket             | 11671
  Updated By         | software-horde at interfasys.ch
  Summary            | The dynamic view crashes on some Inboxes
  Queue              | IMP
  Version            | 6.0.1
  Type               | Bug
  State              | No Feedback
  Priority           | 2. Medium
  Milestone          |
  Patch              |
  Owners             |
------------------------------------------------------------------------------


software-horde at interfasys.ch (2012-11-26 11:12) wrote:

I've looked at the core dump
And one particular email with a very long list of recipient either  
makes PCRE crash

Starts with
#0  0x00000008006105e2 in match () from /usr/local/lib/libpcre.so.1
#7670 0x0000000802257bf2 in php_pcre_match_impl
#7671 0x00000008022585f8 in php_do_pcre_match
etc.

ends with
#7725 0x00000008025165a7 in php_execute_script  
(primary_file=0x7fffffffe170) at /php-5.4.9/main/main.c:2482
         realfile =  
"\360\333\377\377\377\177\000\000h\211\314\033\b\000\000\000\020\334\377\377\000\000\000\000\200\334\377\377\000\000\000\000\020\334\377\377\377\177\000\000\365\001\b\000\000\000\000\377\314\033\b\000\000\000\200\334\377\377\377\177\000\000\320\334\377\377\377\177\000\000\020\226\206\001\b", '\000' <repeats 12 times>"\335, \377\377\377\177\000\000\220\335\377\377\377\177\000\000  
\211\314\033\b\000\000\000\030\024\315\033\b\000\000\000\310l\266\001\b\000\000\000\340\020\315\033\b\000\000\000\217\334\377\377\377\177\000\000\220\334\377\377\377\177\000\000\372\231\207\001\b\000\000\000\340\005\315\033\b\000\000\000X\335\377\377\377\177\000\000\200b\017\001\b\000\000\000\300\334\377\377\377\177\000\000\240b\017\001\b\000\000\000\000\001\000\000\000\000\000\000X\370\260\005\b\000\000\000\000\002\000\000\000\000\000\000\260\005\261\005\b\000\000\000\000\223\317\005\b\000\000\000\020\002\000\000\000\000\000\000\250#\261\005\b\000\000\000\260\005\261\005\b\000\000\000\017\022U\002\b\000\000\000(\305)\347\265\b\255\262\260\005\b\000\000\000GX\270\035\343\236g\206\000\000\000\000\000\000\000\000\307"...
         __orig_bailout = 0x7fffffffe1f0
         __bailout = {{_sjb = {34398626970, 34407231968,  
140737488341896, 140737488347472, 34826363040, 0, 34826179216, 0,  
34407187071, 34826363040,
               34407230688, 34359738368}}}
         prepend_file_p = 0x0
         append_file_p = 0x1df4
         prepend_file = {type = ZEND_HANDLE_FILENAME, filename = 0x0,  
opened_path = 0x0, handle = {fd = 0, fp = 0x0, stream = {handle = 0x0,  
isatty = 0,
               mmap = {len = 0, pos = 0, map = 0x0, buf = 0x0,  
old_handle = 0x0, old_closer = 0x0}, reader = 0x0, fsizer = 0x0,  
closer = 0x0}},
           free_filename = 0 '\000'}
         append_file = {type = ZEND_HANDLE_FILENAME, filename = 0x0,  
opened_path = 0x0, handle = {fd = 0, fp = 0x0, stream = {handle = 0x0,  
isatty = 0,
               mmap = {len = 0, pos = 0, map = 0x0, buf = 0x0,  
old_handle = 0x0, old_closer = 0x0}, reader = 0x0, fsizer = 0x0,  
closer = 0x0}},
           free_filename = 0 '\000'}
         old_cwd = 0x7fffffffcba0 "/"
         retval = 0
#7726 0x000000080261d292 in php_handler (r=0x81bd020a0) at  
/php-5.4.9/sapi/apache2handler/sapi_apache2.c:667
         zfd = {type = ZEND_HANDLE_FILENAME, filename = 0x81bd2b560  
"/var/www/html/webmail/services/ajax.php", opened_path = 0x0, handle =  
{fd = 0,
             fp = 0x0, stream = {handle = 0x0, isatty = 0, mmap = {len  
= 0, pos = 0, map = 0x0, buf = 0x0, old_handle = 0x0, old_closer = 0x0},
               reader = 0x0, fsizer = 0x0, closer = 0x0}},  
free_filename = 0 '\000'}
         __bailout = {{_sjb = {34399702360, 34450510960,  
140737488347480, 16, 34826363040, 0, 34826179216, 0, 895, 0,  
140737488347760, 34359738368}}}
         ctx = 0x81bd06de0
         conf = 0x81bcfe418
         brigade = 0x81bd00d98
         bucket = <optimized out>
         rv = <optimized out>
         parent_req = 0x0

Will check the PHP bugs DB





More information about the bugs mailing list