ID:               38512
 Updated by:       [EMAIL PROTECTED]
 Reported By:      peter dot mescalchin at gmail dot com
-Status:           Open
+Status:           Feedback
 Bug Type:         PCRE related
 Operating System: Windows XP
 PHP Version:      5.1.5
 New Comment:

Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows:
 
  http://snaps.php.net/win32/php5.2-win32-latest.zip




Previous Comments:
------------------------------------------------------------------------

[2006-08-19 13:51:38] peter dot mescalchin at gmail dot com

Description:
------------
Passing large strings to PCRE functions in PHP versions 5.1.3 or
greater and Apache 2.0.59 with the regexp "/(\r|\n|.)*/" crashes
PHP/Apache request.

Referring to the source code, a string length greater than 376
character crashes the request.

Rolling back to PHP 5.1.2, using PCRE 6.2 works correctly without
crashing for string lengths greater than 376 characters.

The bug is very similar to the following PHP bug report:

http://bugs.php.net/bug.php?id=24460

Reproduce code:
---------------
<?PHP

$test = str_repeat('a',377);

// preg_match() will crash the request
preg_match('/(\r|\n|.)*/',$test);

?>

Expected result:
----------------
The script to end gracefully.

Actual result:
--------------
Crashing of the PHP request.


------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=38512&edit=1

Reply via email to