diff options
author | Dmitry Stogov <dmitry@php.net> | 2005-06-07 10:21:52 +0000 |
---|---|---|
committer | Dmitry Stogov <dmitry@php.net> | 2005-06-07 10:21:52 +0000 |
commit | 4658513d70279f940c7c3d2b54612ad4549e1fa5 (patch) | |
tree | b78133be6275045a559532a51392c50c87f493e7 /Zend/zend_execute.c | |
parent | f07eed91c417d6bdedddf5774e71222958c69d10 (diff) | |
download | php-git-4658513d70279f940c7c3d2b54612ad4549e1fa5.tar.gz |
fixed memory leak in bug #28972 ([] operator overflow treatment is incorrect), not the bug itself.
Diffstat (limited to 'Zend/zend_execute.c')
-rw-r--r-- | Zend/zend_execute.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Zend/zend_execute.c b/Zend/zend_execute.c index 0a69d16747..ffae16f577 100644 --- a/Zend/zend_execute.c +++ b/Zend/zend_execute.c @@ -1151,7 +1151,7 @@ static void zend_fetch_dimension_address(temp_variable *result, zval **container new_zval->refcount++; if (zend_hash_next_index_insert(container->value.ht, &new_zval, sizeof(zval *), (void **) &retval) == FAILURE) { zend_error(E_WARNING, "Cannot add element to the array as the next element is already occupied"); - retval = &EG(uninitialized_zval_ptr); + retval = &EG(error_zval_ptr); new_zval->refcount--; } } else { |