reference/pcre/configure.xml
62a00eed7c748c2331eb5744c7a48af8582a2046
...
...
@@ -8,17 +8,15 @@
8
8
library. Alternatively, an external PCRE library can be used by
9
9
passing in the <option role="configure">--with-pcre-regex=DIR</option>
10
10
configuration option where <literal>DIR</literal> is the location of
11
-
PCRE's include and library files. It is recommended to use PCRE 8.10 or newer
12
-
for PHP 5.6 and 7.0.
11
+
PCRE's include and library files. It is recommended to use PCRE 8.10 or newer;
12
+
as of PHP 7.3.0, PCRE2 is required.
13
+
</para>
14
+
<para>
15
+
PCRE's just-in-time compilation is supported by default, which
16
+
can be disabled with the <option role="configure">--without-pcre-jit</option>
17
+
configuration option as of PHP 7.0.12.
13
18
</para>
14
19
&windows.builtin;
15
-
<note>
16
-
<para>
17
-
Before PHP 5.3.0, this extension could be disabled by passing in
18
-
the <option role="configure">--without-pcre-regex</option>
19
-
configuration option.
20
-
</para>
21
-
</note>
22
20
<para>
23
21
PCRE is an active project and as it changes so does the PHP
24
22
functionality that relies upon it. It is possible that certain parts
...
...
@@ -40,104 +38,49 @@
40
38
</thead>
41
39
<tbody>
42
40
<row>
43
-
<entry>5.6.9 / 5.5.26 / 5.4.41</entry>
44
-
<entry>8.37</entry>
45
-
<entry>See CVE-2015-2325, CVE-2015-2326</entry>
46
-
</row>
47
-
<row>
48
-
<entry>5.6.0 / 5.5.10</entry>
49
-
<entry>8.34</entry>
50
-
<entry></entry>
51
-
</row>
52
-
<row>
53
-
<entry>5.5.0 / 5.4.14 / 5.3.24</entry>
54
-
<entry>8.32</entry>
55
-
<entry></entry>
56
-
</row>
57
-
<row>
58
-
<entry>5.4.9 / 5.3.19</entry>
59
-
<entry>8.31</entry>
60
-
<entry></entry>
61
-
</row>
62
-
<row>
63
-
<entry>5.3.7</entry>
64
-
<entry>8.12</entry>
65
-
<entry></entry>
66
-
</row>
67
-
<row>
68
-
<entry>5.3.6</entry>
69
-
<entry>8.11</entry>
70
-
<entry></entry>
71
-
</row>
72
-
<row>
73
-
<entry>5.3.4</entry>
74
-
<entry>8.10</entry>
75
-
<entry></entry>
76
-
</row>
77
-
<row>
78
-
<entry>5.3.3</entry>
79
-
<entry>8.02</entry>
80
-
<entry></entry>
81
-
</row>
82
-
<row>
83
-
<entry>5.3.2</entry>
84
-
<entry>8.00</entry>
85
-
<entry></entry>
86
-
</row>
87
-
<row>
88
-
<entry>5.3.0</entry>
89
-
<entry>7.9</entry>
41
+
<entry>8.2.0</entry>
42
+
<entry>10.40</entry>
90
43
<entry></entry>
91
44
</row>
92
45
<row>
93
-
<entry>5.2.7</entry>
94
-
<entry>7.8</entry>
46
+
<entry>8.1.0</entry>
47
+
<entry>10.39</entry>
95
48
<entry></entry>
96
49
</row>
97
50
<row>
98
-
<entry>5.2.6</entry>
99
-
<entry>7.6</entry>
51
+
<entry>7.4.12, 8.0.0</entry>
52
+
<entry>10.35</entry>
100
53
<entry></entry>
101
54
</row>
102
55
<row>
103
-
<entry>5.2.5</entry>
104
-
<entry>7.3</entry>
56
+
<entry>7.4.6</entry>
57
+
<entry>10.34</entry>
105
58
<entry></entry>
106
59
</row>
107
60
<row>
108
-
<entry>5.2.4</entry>
109
-
<entry>7.2</entry>
61
+
<entry>7.4.0</entry>
62
+
<entry>10.33</entry>
110
63
<entry></entry>
111
64
</row>
112
65
<row>
113
-
<entry>5.2.2</entry>
114
-
<entry>7.0</entry>
66
+
<entry>7.3.0</entry>
67
+
<entry>10.32</entry>
115
68
<entry></entry>
116
69
</row>
117
70
<row>
118
-
<entry>5.2.0</entry>
119
-
<entry>6.7</entry>
71
+
<entry>7.2.0</entry>
72
+
<entry>8.41</entry>
120
73
<entry></entry>
121
74
</row>
122
75
<row>
123
-
<entry>5.1.0</entry>
124
-
<entry>6.2</entry>
125
-
<entry></entry>
126
-
</row>
127
-
<row>
128
-
<entry>5.0.5</entry>
129
-
<entry>5.0</entry>
130
-
<entry></entry>
131
-
</row>
132
-
<row>
133
-
<entry>5.0.0</entry>
134
-
<entry>4.5</entry>
135
-
<entry></entry>
76
+
<entry>7.0.3</entry>
77
+
<entry>8.38</entry>
78
+
<entry>See CVE-2015-8383, CVE-2015-8386, CVE-2015-8387, CVE-2015-8389, CVE-2015-8390, CVE-2015-8391, CVE-2015-8393, CVE-2015-8394</entry>
136
79
</row>
137
80
<row>
138
-
<entry>4.4.7</entry>
139
-
<entry>7.7</entry>
140
-
<entry></entry>
81
+
<entry>7.0.0</entry>
82
+
<entry>8.37</entry>
83
+
<entry>See CVE-2015-2325, CVE-2015-2326</entry>
141
84
</row>
142
85
</tbody>
143
86
</tgroup>
144
87