https://bugs.exim.org/show_bug.cgi?id=1991
--- Comment #4 from Philip Hazel ---
In fact, I have already added a limiting facility to pcre2_dfa_match(). Change
36 of release 10.23 reads thus: "The pcre2_dfa_match() function now takes note
of the recursion limit for the internal recursive calls tha
https://bugs.exim.org/show_bug.cgi?id=1991
--- Comment #3 from Kamil Frankowicz ---
Created attachment 1013
--> https://bugs.exim.org/attachment.cgi?id=1013&action=edit
Smaller POC to trigger stack overflow (pcre2test)
--
You are receiving this mail because:
You are on the CC list for the bug
https://bugs.exim.org/show_bug.cgi?id=1991
--- Comment #2 from Kamil Frankowicz ---
(In reply to Philip Hazel from comment #1)
> This is caused by a complicated regex with many nested parentheses.
> Compiling such a pattern uses a lot of stack (especially when ASAN is
> enabled; this increases st
https://bugs.exim.org/show_bug.cgi?id=1991
Philip Hazel changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---