https://bugs.exim.org/show_bug.cgi?id=1854
--- Comment #14 from Philip Hazel <[email protected]> --- The first of your crashing inputs had nothing to do with integer overflow. It was caused by requesting all potentially captured strings to be output (the /= modifier) when doing DFA matching (the \D escape in the subject line). This is nonsensical because DFA matching does not capture substrings. As a result, random values were being used. I have modified both pcretest and pcre2test to ignore the request for all captures (with a warning message) after a DFA match. Patches to both programs are committed. -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/pcre-dev
