Hi there,
we just ran into a version of the bug "JIT bug with lookbehind assertion":
        https://bugs.exim.org/show_bug.cgi?id=1189

To reproduce it you can use
        php -n -r 'ini_set("pcre.jit", 0); echo 
preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");'
vs.
        php -n -r 'ini_set("pcre.jit", 1); echo 
preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");'

Since the PCRE bug report dates from 2011-12-27 and is still marked NEW I 
wonder if it would be safer for PHP to disable pcre.jit in the recommended 
php.ini configuration files.

Also: Does anyone know who might be able/willing to look at the upstream bug?

Regards,
- Chris


--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to