From df96b038aa7627307ad8305e92ec262f04b6da3d Mon Sep 17 00:00:00 2001 From: Dmitry Stogov Date: Tue, 7 Jun 2005 10:29:42 +0000 Subject: [PATCH] fixed memory leak in bug #28972 ([] operator overflow treatment is incorrect), not the bug itself. --- Zend/zend_execute.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Zend/zend_execute.c b/Zend/zend_execute.c index f81cc54cf0..661322fa13 100644 --- a/Zend/zend_execute.c +++ b/Zend/zend_execute.c @@ -934,7 +934,7 @@ static void zend_fetch_dimension_address(znode *result, znode *op1, znode *op2, new_zval->refcount++; if (zend_hash_next_index_insert(container->value.ht, &new_zval, sizeof(zval *), (void **) retval) == FAILURE) { zend_error(E_WARNING, "Cannot add element to the array as the next element is already occupied"); - *retval = &EG(uninitialized_zval_ptr); + *retval = &EG(error_zval_ptr); new_zval->refcount--; } } else { -- 2.50.1