Bug#555808: libpcre3: segfault on matching certain regexes with large input

2009-11-11 Thread Mark Baker
I believe this is a duplicate the many other bugs in PCRE; basically that it's possible to get stack overflows with certain regexes. It's not a major security problem, in that I don't think you can get arbitrary code execution by a stack overflow. It could possibly allow DoS attacks in some ca

Bug#555808: libpcre3: segfault on matching certain regexes with large input

2009-11-11 Thread Nico Golde
Hi, * Mark Baker [2009-11-11 22:17]: > I believe this is a duplicate the many other bugs in PCRE; basically that > it's > possible to get stack overflows with certain regexes. Ok. > It's not a major security problem, in that I don't think you can get > arbitrary > code execution by a stack o

Bug#555808: libpcre3: segfault on matching certain regexes with large input

2009-11-11 Thread Nico Golde
Package: libpcre3 Version: 7.8-2 Severity: important Tags: security Hello, I stumbled over a regular expression use with preg_replace from php that causes preg_replace to never return but actually segfault in libpcre3. A very simple test-case in php is attached (note I know that this regex is fa