[pcre-dev] [Bug 1638] PCRE Library Call Stack Overflow Vulne…

Pàgina inicial
Delete this message
Autor: admin
Data:  
A: pcre-dev
Assumpte: [pcre-dev] [Bug 1638] PCRE Library Call Stack Overflow Vulnerability in match()
https://bugs.exim.org/show_bug.cgi?id=1638

--- Comment #3 from hhjack <rubymail@???> ---
It does not seem to be a problem of PHP.
I have mailed to them lately about this potential match_limit_recursion thing.
Here is what they reply:
"
We cannot do much for it. Increase the stack of your server (apache has an
option for that for example) or simplify your regex.
One should really not feed pcre with custom inputs :)
"

--
You are receiving this mail because:
You are on the CC list for the bug.