Hi there,
we just ran into a version of the bug "JIT bug with lookbehind assertion":
https://bugs.exim.org/show_bug.cgi?id=1189
To reproduce it you can use
php -n -r 'ini_set("pcre.jit", 0); echo
preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");'
vs.
php -n -r 'ini_set("pcre.jit", 1); echo
preg_replace("/\b(11|21|41)\b/u", "z", "x°11\n");'
Since the PCRE bug report dates from 2011-12-27 and is still marked NEW I
wonder if it would be safer for PHP to disable pcre.jit in the recommended
php.ini configuration files.
Also: Does anyone know who might be able/willing to look at the upstream bug?
Regards,
- Chris
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php