[pcre-dev] [Bug 725] Seg Fault occures when using php's pre…

Αρχική Σελίδα
Delete this message
Συντάκτης: Markus Schulte
Ημερομηνία:  
Προς: pcre-dev
Αντικείμενο: [pcre-dev] [Bug 725] Seg Fault occures when using php's preg_replace with an extreme subject (PCRE 7.7)
------- You are receiving this mail because: -------
You are on the CC list for the bug.

http://bugs.exim.org/show_bug.cgi?id=725

Markus Schulte <markus.schulte@???> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|WORKSFORME                  |





--- Comment #2 from Markus Schulte <markus.schulte@???> 2008-07-09 17:04:31 ---
(In reply to comment #1)
> I cannot reproduce any crash. You were mostly trigering a stack overflow, which
> is not a bug per se.
>


I am really surprised, that you cannot reproduce the crash. I have executed
this script on different machines, and it never worked. Could you please tell
me the configuration of the system you are using?

Further on, I think a stack overflow is a typical bug. Though i do not think,
that this problem occurs, because of the length of the used variable $sql. When
I replace $sql by "$sql = str_repeat('-=a', 100000);" I do not have any
problems, though this $sql is much longer than the originally used one.

Greetz, Markus


--
Configure bugmail: http://bugs.exim.org/userprefs.cgi?tab=email