Package: pcre3 Severity: important When running a regular expression where a look-ahead is used to tell two possible paths apart and this choice is done in a repeating group you will get a stack overflow if the string you are matching is long enough.
More information can be found at: https://bugs.launchpad.net/ubuntu/+source/pcre3/+bug/334107 Installed debug symbols show the call producing the load on the stack to be at pcre_exec.c:775. Also pcre_exec.c:1311 is found in the stackdump once in a while (about every 10th stack item). -- System Information: Debian Release: squeeze/sid APT prefers oldstable APT policy: (500, 'oldstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.27.10-grsec-xxxx-grs-ipv6-32 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org