[pcre-dev] [Bug 1638] PCRE Library Call Stack Overflow Vulne…

Startseite
Nachricht löschen
Autor: admin
Datum:  
To: pcre-dev
Betreff: [pcre-dev] [Bug 1638] PCRE Library Call Stack Overflow Vulnerability in match()
https://bugs.exim.org/show_bug.cgi?id=1638

--- Comment #3 from hhjack <rubymail@???> ---
It does not seem to be a problem of PHP.
I have mailed to them lately about this potential match_limit_recursion thing.
Here is what they reply:
"
We cannot do much for it. Increase the stack of your server (apache has an
option for that for example) or simplify your regex.
One should really not feed pcre with custom inputs :)
"

--
You are receiving this mail because:
You are on the CC list for the bug.