https://bugs.exim.org/show_bug.cgi?id=1854
--- Comment #14 from Philip Hazel <ph10@???> ---
The first of your crashing inputs had nothing to do with integer overflow. It
was caused by requesting all potentially captured strings to be output (the /=
modifier) when doing DFA matching (the \D escape in the subject line). This is
nonsensical because DFA matching does not capture substrings. As a result,
random values were being used. I have modified both pcretest and pcre2test to
ignore the request for all captures (with a warning message) after a DFA match.
Patches to both programs are committed.
--
You are receiving this mail because:
You are on the CC list for the bug.