summaryrefslogtreecommitdiff
path: root/Zend/zend_execute.c
diff options
context:
space:
mode:
authorDmitry Stogov <dmitry@php.net>2005-06-07 10:29:42 +0000
committerDmitry Stogov <dmitry@php.net>2005-06-07 10:29:42 +0000
commitdf96b038aa7627307ad8305e92ec262f04b6da3d (patch)
tree3e876a02e76c873d5c2ad6a11906fb667dbe824e /Zend/zend_execute.c
parent5db859f053856e6342ec91785ed24ceebd4d53ae (diff)
downloadphp-git-df96b038aa7627307ad8305e92ec262f04b6da3d.tar.gz
fixed memory leak in bug #28972 ([] operator overflow treatment is incorrect), not the bug itself.
Diffstat (limited to 'Zend/zend_execute.c')
-rw-r--r--Zend/zend_execute.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/Zend/zend_execute.c b/Zend/zend_execute.c
index f81cc54cf0..661322fa13 100644
--- a/Zend/zend_execute.c
+++ b/Zend/zend_execute.c
@@ -934,7 +934,7 @@ static void zend_fetch_dimension_address(znode *result, znode *op1, znode *op2,
new_zval->refcount++;
if (zend_hash_next_index_insert(container->value.ht, &new_zval, sizeof(zval *), (void **) retval) == FAILURE) {
zend_error(E_WARNING, "Cannot add element to the array as the next element is already occupied");
- *retval = &EG(uninitialized_zval_ptr);
+ *retval = &EG(error_zval_ptr);
new_zval->refcount--;
}
} else {