Edit report at https://bugs.php.net/bug.php?id=60423&edit=1
ID: 60423
User updated by: amal dot samally at gmail dot com
Reported by: amal dot samally at gmail dot com
Summary: Segmentation fault with the UTF-8 check regexp in
some cases
-Status: Feedback
+Status: Open
Type: Bug
Package: PCRE related
Operating System: Linux
PHP Version: 5.3.8
Block user comment: N
Private report: N
New Comment:
gdb output:
(gdb) run test.php
Starting program: /usr/local/bin/php test.php
[Thread debugging using libthread_db enabled]
Program received signal SIGSEGV, Segmentation fault.
0x0000000000498948 in match (
eptr=0x139a566 "1{font-weight:bold}#gbg6.gbgt-
hvr,#gbg6.gbgt:focus{background-color:transparent;background-
image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px
0;*padding:25px 5px 0}.gbto .gbg4a "..., ecode=0x13d9525 "^",
mstart=0x13990f0 "<!doctype html> <head> <title>docs.pravo.ru -
ÐоиÑк в
Google</title> <script>window.google={kEI:\"hTnXTp-
POZDqOabAzMYO\",getEI:function(a){var b;while(a&&!
(a.getAttribute&&(b=a.getAttribute"..., markptr=0x0, offset_top=2,
md=0x7fffffffb340, ims=0, eptrb=Cannot access memory at address 0x7fffff7feff8
)
at /tmp/php_build/php-5.3.8/ext/pcre/pcrelib/pcre_exec.c:471
471 {
(gdb) bt
#0 0x0000000000498948 in match (
eptr=0x139a566 "1{font-weight:bold}#gbg6.gbgt-
hvr,#gbg6.gbgt:focus{background-color:transparent;background-
image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px
0;*padding:25px 5px 0}.gbto .gbg4a "..., ecode=0x13d9525 "^",
mstart=0x13990f0 "<!doctype html> <head> <title>docs.pravo.ru -
ÐоиÑк в
Google</title> <script>window.google={kEI:\"hTnXTp-
POZDqOabAzMYO\",getEI:function(a){var b;while(a&&!
(a.getAttribute&&(b=a.getAttribute"..., markptr=0x0, offset_top=2,
md=0x7fffffffb340, ims=0, eptrb=Cannot access memory at address 0x7fffff7feff8
)
at /tmp/php_build/php-5.3.8/ext/pcre/pcrelib/pcre_exec.c:471
#1 0x000000000049b352 in match (
eptr=0x139a566 "1{font-weight:bold}#gbg6.gbgt-
hvr,#gbg6.gbgt:focus{background-color:transparent;background-
image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px
0;*padding:25px 5px 0}.gbto .gbg4a "..., ecode=0x13d9748 "V\002#\033U\002,",
mstart=0x13990f0 "<!doctype html> <head> <title>docs.pravo.ru -
ÐоиÑк в
Google</title> <script>window.google={kEI:\"hTnXTp-
POZDqOabAzMYO\",getEI:function(a){var b;while(a&&!
(a.getAttribute&&(b=a.getAttribute"..., markptr=0x0, offset_top=2,
md=0x7fffffffb340, ims=0, eptrb=0x0, flags=0, rdepth=10464)
at /tmp/php_build/php-5.3.8/ext/pcre/pcrelib/pcre_exec.c:1654
#2 0x00000000004994e0 in match (
eptr=0x139a565 "s1{font-weight:bold}#gbg6.gbgt-
hvr,#gbg6.gbgt:focus{background-color:transparent;background-
image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px
0;*padding:25px 5px 0}.gbto .gbg4a"..., ecode=0x13d9525 "^",
mstart=0x13990f0 "<!doctype html> <head> <title>docs.pravo.ru -
ÐоиÑк в
Google</title> <script>window.google={kEI:\"hTnXTp-
POZDqOabAzMYO\",getEI:function(a){var b;while(a&&!
(a.getAttribute&&(b=a.getAttribute"..., markptr=0x0, offset_top=2,
md=0x7fffffffb340, ims=0, eptrb=0x0, flags=0, rdepth=10463)
at /tmp/php_build/php-5.3.8/ext/pcre/pcrelib/pcre_exec.c:885
#3 0x000000000049b352 in match (
eptr=0x139a565 "s1{font-weight:bold}#gbg6.gbgt-
hvr,#gbg6.gbgt:focus{background-color:transparent;background-
image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px
0;*padding:25px 5px 0}.gbto .gbg4a"..., ecode=0x13d9748 "V\002#\033U\002,",
mstart=0x13990f0 "<!doctype html> <head> <title>docs.pravo.ru -
ÐоиÑк в
Google</title> <s---Type <return> to continue, or q <return> to quit---
Previous Comments:
------------------------------------------------------------------------
[2011-12-01 14:46:10] [email protected]
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php for *NIX and
http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32
Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PHP better.
------------------------------------------------------------------------
[2011-12-01 10:57:33] amal dot samally at gmail dot com
I think not.
Also changing pcre.backtrack_limit / pcre.recursion_limit do not give anything.
------------------------------------------------------------------------
[2011-12-01 10:10:52] [email protected]
see #41638, may be the same.
------------------------------------------------------------------------
[2011-12-01 09:04:37] amal dot samally at gmail dot com
Description:
------------
I'm using the regexp to test whether a string is a valid UTF-8 encoded string.
But in some cases it causes a segmentation fault.
Examples of strings that cause the error:
http://samally.ru/php_pcre_segmentation_fault/test1.txt
http://samally.ru/php_pcre_segmentation_fault/test2.txt
Test script:
---------------
$string =
file_get_contents('http://samally.ru/php_pcre_segmentation_fault/test1.txt');
// $string =
file_get_contents('http://samally.ru/php_pcre_segmentation_fault/test2.txt');
// Tests whether a string is a valid UTF-8 encoded string.
// @link http://w3.org/International/questions/qa-forms-utf-8.html
$r = preg_match('~^(?:
[\x09\x0A\x0D\x20-\x7E] # ASCII without control characters
| [\xC2-\xDF][\x80-\xBF] # non-overlong 2-byte
| \xE0[\xA0-\xBF][\x80-\xBF] # excluding overlongs
| [\xE1-\xEC\xEE\xEF][\x80-\xBF]{2} # straight 3-byte
| \xED[\x80-\x9F][\x80-\xBF] # excluding surrogates
| \xF0[\x90-\xBF][\x80-\xBF]{2} # planes 1-3
| [\xF1-\xF3][\x80-\xBF]{3} # planes 4-15
| \xF4[\x80-\x8F][\x80-\xBF]{2} # plane 16
)*$~DSXx', $string);
------------------------------------------------------------------------
--
Edit this bug report at https://bugs.php.net/bug.php?id=60423&edit=1