On 2021-06-20 11:27, Philip Hazel wrote:
A little bit further up from what you quoted, the docs say this: "The two
"extended" options are not independent; unsetting either
one cancels the effects of both of them." So (?-x) and (?-xx) are the
same, and unset both (?x) and (?xx).
I apologize
https://bugs.exim.org/show_bug.cgi?id=2776
Philip Hazel changed:
What|Removed |Added
Resolution|--- |INVALID
Status|NEW
https://bugs.exim.org/show_bug.cgi?id=2774
Philip Hazel changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---
https://bugs.exim.org/show_bug.cgi?id=2773
Philip Hazel changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---
https://bugs.exim.org/show_bug.cgi?id=2775
Philip Hazel changed:
What|Removed |Added
Resolution|--- |WONTFIX
Status|NEW
https://bugs.exim.org/show_bug.cgi?id=2776
Bug ID: 2776
Summary: pcre2_match.cin PCRE2 10.23 stack-overflow.
Product: PCRE
Version: 10.23 (PCRE2)
Hardware: x86-64
OS: Linux
Status: NEW
Severity: bug
https://bugs.exim.org/show_bug.cgi?id=2777
Bug ID: 2777
Summary: pcre2_match.cin PCRE2 10.23 stack-overflow.
Product: PCRE
Version: 10.23 (PCRE2)
Hardware: x86-64
OS: Linux
Status: NEW
Severity: bug
https://bugs.exim.org/show_bug.cgi?id=2775
Bug ID: 2775
Summary: pcre_exec.c in PCRE 8.40 allows remote attackers to
cause stack-overflow.
Product: PCRE
Version: 8.40
Hardware: x86-64
OS: Linux
https://bugs.exim.org/show_bug.cgi?id=2773
Bug ID: 2773
Summary: pcretest.c in PCRE 8.40 allows remote attackers to
cause a denial of service (heap-based buffer overflow)
Product: PCRE
Version: 8.40
Hardware: x86-64
https://bugs.exim.org/show_bug.cgi?id=2774
Bug ID: 2774
Summary: pcretest.c in PCRE 8.40 allows remote attackers to
cause a denial of service (heap-based buffer overflow)
Product: PCRE
Version: 8.40
Hardware: x86-64
A little bit further up from what you quoted, the docs say this: "The two
"extended" options are not independent; unsetting either
one cancels the effects of both of them." So (?-x) and (?-xx) are the
same, and unset both (?x) and (?xx).
Regards,
Philip
On Sat, 19 Jun 2021 at 16:57, ND via
11 matches
Mail list logo