https://bugs.exim.org/show_bug.cgi?id=1854
--- Comment #5 from Philip Hazel <p...@hermes.cam.ac.uk> --- Thank you for your input. The pcretest program originated as a quick hack to test the first version of PCRE, nearly 20 years ago. It was subsequently more and more hacked as PCRE got extended until it is now a terrible ball of messy code. It was never intended to be robust against random fuzzer-style input, which is what you seem to be feeding it. In particular, some of your input contains binary zeroes, which will have weird effects. The current development of PCRE is the PCRE2 series, 10.xx (10.22-RC1 is currently available for testing). For the revised API I completely rewrote the test program as pcre2test. This version is much cleaner and robust, and it even detects (and complains about) binary zeroes in its input. Although I may still look some more at your test cases, I am not sure that it is worth worrying too much about this kind of issue in pcretest at this stage of its life. -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/pcre-dev