Package: pcre3
Severity: important

When running a regular expression where a look-ahead is used to 
tell two possible paths apart and this choice is done in a 
repeating group you will get a stack overflow if the string 
you are matching is long enough.

More information can be found at:
https://bugs.launchpad.net/ubuntu/+source/pcre3/+bug/334107

Installed debug symbols show the call producing the load on 
the stack to be at pcre_exec.c:775. Also pcre_exec.c:1311 is
found in the stackdump once in a while (about every 10th stack item).

-- System Information:
Debian Release: squeeze/sid
  APT prefers oldstable
  APT policy: (500, 'oldstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.27.10-grsec-xxxx-grs-ipv6-32 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to