From: Dmitry Stogov Date: Tue, 7 Jun 2005 10:21:52 +0000 (+0000) Subject: fixed memory leak in bug #28972 ([] operator overflow treatment is incorrect), not... X-Git-Tag: php-5.0.1b1~61 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=4658513d70279f940c7c3d2b54612ad4549e1fa5;p=php fixed memory leak in bug #28972 ([] operator overflow treatment is incorrect), not the bug itself. --- diff --git a/Zend/zend_execute.c b/Zend/zend_execute.c index 0a69d16747..ffae16f577 100644 --- a/Zend/zend_execute.c +++ b/Zend/zend_execute.c @@ -1151,7 +1151,7 @@ static void zend_fetch_dimension_address(temp_variable *result, zval **container new_zval->refcount++; if (zend_hash_next_index_insert(container->value.ht, &new_zval, sizeof(zval *), (void **) &retval) == FAILURE) { zend_error(E_WARNING, "Cannot add element to the array as the next element is already occupied"); - retval = &EG(uninitialized_zval_ptr); + retval = &EG(error_zval_ptr); new_zval->refcount--; } } else {