Hi there, we just ran into a version of the bug "JIT bug with lookbehind assertion": https://bugs.exim.org/show_bug.cgi?id=1189
To reproduce it you can use php -n -r 'ini_set("pcre.jit", 0); echo preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");' vs. php -n -r 'ini_set("pcre.jit", 1); echo preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");' Since the PCRE bug report dates from 2011-12-27 and is still marked NEW I wonder if it would be safer for PHP to disable pcre.jit in the recommended php.ini configuration files. Also: Does anyone know who might be able/willing to look at the upstream bug? Regards, - Chris -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php