ID:               44299
 Updated by:       [EMAIL PROTECTED]
 Reported By:      test_junk at hotmail dot it
-Status:           Open
+Status:           Assigned
 Bug Type:         PCRE related
 Operating System: All
 PHP Version:      4.4.8
-Assigned To:      
+Assigned To:      nlopess
 New Comment:

>From what I can see from their ChangeLog:

1.  A character class containing a very large number of characters
with
    codepoints greater than 255 (in UTF-8 mode, of course) caused a
    buffer overflow.

Which is only an issue for the expression, and not "input" - so this
should only be an issue if you use user-supplied input. Otherwise it's
just a local-developer issue only. Which IMO doesn't warrant a new
release.


Previous Comments:
------------------------------------------------------------------------

[2008-03-01 22:52:54] [EMAIL PROTECTED]

I can upgrade it in CVS, but I'm not sure there will be any further PHP
4 release. Derick can you comment on this?

------------------------------------------------------------------------

[2008-02-29 23:58:05] test_junk at hotmail dot it

Description:
------------
Hello,

PCRE versions prior to 7.6 are affected by a vulnerability:
http://www.securityfocus.com/bid/27786

Unfortunately php 4.4.8 compiled against version 7.6 is unstable, are
you going to fix this issue?

Thanks



------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=44299&edit=1

Reply via email to