I believe this is a duplicate the many other bugs in PCRE; basically
that it's possible to get stack overflows with certain regexes.
It's not a major security problem, in that I don't think you can get
arbitrary code execution by a stack overflow. It could possibly allow
DoS attacks in some ca
Hi,
* Mark Baker [2009-11-11 22:17]:
> I believe this is a duplicate the many other bugs in PCRE; basically that
> it's
> possible to get stack overflows with certain regexes.
Ok.
> It's not a major security problem, in that I don't think you can get
> arbitrary
> code execution by a stack o
Package: libpcre3
Version: 7.8-2
Severity: important
Tags: security
Hello,
I stumbled over a regular expression use with preg_replace from php that causes
preg_replace to never
return but actually segfault in libpcre3.
A very simple test-case in php is attached (note I know that this regex is fa
3 matches
Mail list logo