Re: [pcre-dev] Typo about (?^)

2021-06-20 Thread ND via Pcre-dev
On 2021-06-20 11:27, Philip Hazel wrote: A little bit further up from what you quoted, the docs say this: "The two "extended" options are not independent; unsetting either one cancels the effects of both of them." So (?-x) and (?-xx) are the same, and unset both (?x) and (?xx). I apologize

[pcre-dev] [Bug 2776] pcre2_match.cin PCRE2 10.23 stack-overflow.

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2776 Philip Hazel changed: What|Removed |Added Resolution|--- |INVALID Status|NEW

[pcre-dev] [Bug 2774] pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow)

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2774 Philip Hazel changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[pcre-dev] [Bug 2773] pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow)

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2773 Philip Hazel changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[pcre-dev] [Bug 2775] pcre_exec.c in PCRE 8.40 allows remote attackers to cause stack-overflow.

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2775 Philip Hazel changed: What|Removed |Added Resolution|--- |WONTFIX Status|NEW

[pcre-dev] [Bug 2776] New: pcre2_match.cin PCRE2 10.23 stack-overflow.

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2776 Bug ID: 2776 Summary: pcre2_match.cin PCRE2 10.23 stack-overflow. Product: PCRE Version: 10.23 (PCRE2) Hardware: x86-64 OS: Linux Status: NEW Severity: bug

[pcre-dev] [Bug 2777] New: pcre2_match.cin PCRE2 10.23 stack-overflow.

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2777 Bug ID: 2777 Summary: pcre2_match.cin PCRE2 10.23 stack-overflow. Product: PCRE Version: 10.23 (PCRE2) Hardware: x86-64 OS: Linux Status: NEW Severity: bug

[pcre-dev] [Bug 2775] New: pcre_exec.c in PCRE 8.40 allows remote attackers to cause stack-overflow.

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2775 Bug ID: 2775 Summary: pcre_exec.c in PCRE 8.40 allows remote attackers to cause stack-overflow. Product: PCRE Version: 8.40 Hardware: x86-64 OS: Linux

[pcre-dev] [Bug 2773] New: pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow)

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2773 Bug ID: 2773 Summary: pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow) Product: PCRE Version: 8.40 Hardware: x86-64

[pcre-dev] [Bug 2774] New: pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow)

2021-06-20 Thread admin
https://bugs.exim.org/show_bug.cgi?id=2774 Bug ID: 2774 Summary: pcretest.c in PCRE 8.40 allows remote attackers to cause a denial of service (heap-based buffer overflow) Product: PCRE Version: 8.40 Hardware: x86-64

Re: [pcre-dev] Typo about (?^)

2021-06-20 Thread Philip Hazel via Pcre-dev
A little bit further up from what you quoted, the docs say this: "The two "extended" options are not independent; unsetting either one cancels the effects of both of them." So (?-x) and (?-xx) are the same, and unset both (?x) and (?xx). Regards, Philip On Sat, 19 Jun 2021 at 16:57, ND via