ID:               45735
 Updated by:       [EMAIL PROTECTED]
 Reported By:      johnston dot joshua at gmail dot com
 Status:           Bogus
 Bug Type:         PCRE related
 Operating System: *
 PHP Version:      5.2CVS, 5.3CVS, 6CVS (2008-08-06)
 New Comment:

AFAIK only be using a non-stack based evaluator (pcre_dfa_exec)...
which is not compatible with the perl regular expressions, see the
description at
http://manpages.courier-mta.org/htmlman3/pcre_dfa_exec.3.html


Previous Comments:
------------------------------------------------------------------------

[2008-08-06 17:47:50] johnston dot joshua at gmail dot com

I understand it is a known pcre behavior but does that mean it is ok to
let pcre trigger a segmentation fault? Is there no possible way to
handle this failure gracefully?

------------------------------------------------------------------------

[2008-08-06 17:40:50] [EMAIL PROTECTED]

.

------------------------------------------------------------------------

[2008-08-06 17:40:08] [EMAIL PROTECTED]

That is known PCRE behavior.
See: http://manpages.courier-mta.org/htmlman3/pcrestack.3.html

------------------------------------------------------------------------

[2008-08-06 17:29:06] johnston dot joshua at gmail dot com

In my case the parens were unnecessary so I removed them which stopped
the Seg Fault.

Is there a way to handle this error from inside php?

If I set pcre.backtrack_limit to any other value will it always seg
fault if it is too low?

------------------------------------------------------------------------

[2008-08-06 16:38:30] [EMAIL PROTECTED]

Setting pcre.backtrack_limit = 10000 prevents the crash for me.


------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/45735

-- 
Edit this bug report at http://bugs.php.net/?id=45735&edit=1

Reply via email to