Summary: | lang/perl5.24 - remote DoS via CPU exhaustion by exercising glob expansion | ||
---|---|---|---|
Product: | Ports & Packages | Reporter: | Sevan Janiyan <sevan> |
Component: | Individual Port(s) | Assignee: | Mathieu Arnold <mat> |
Status: | Closed Not Accepted | ||
Severity: | Affects Only Me | Flags: | bugzilla:
maintainer-feedback?
(perl) |
Priority: | --- | ||
Version: | Latest | ||
Hardware: | Any | ||
OS: | Any | ||
URL: | https://github.com/Perl/perl5/commit/33252c318625f3c6c89b816ee88481940e3e6f95 |
Description
Sevan Janiyan
![]() ![]() I doubt very much the range of software using regexps in the form of a*a*a*a*a*b is very wide :-) As a side note, it may seems like this is stalling, but the commit in question has only landed in the blead (devel) version of Perl around 2017-05-31, and not even in 5.26.0. So, I'm going to wait for something to happen upstream before I commit to any releases. The Perl maintainers do not feel this is a real problem. They have not added the fix in 5.26.0, and since then, 5.24.2 and 5.22.4 have been released, and they have not added it their either. |