------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugs.exim.org/show_bug.cgi?id=1403
Todd Lyons <tlyons@???> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|nigel@??? |tlyons@???
--- Comment #6 from Todd Lyons <tlyons@???> 2013-10-25 16:39:09 ---
I did want to add the comment that this is only the first *potential* patch I
intend to submit for review. The other plan of attack is to call pcre_exec()
with a match limit, possibly a computed value, or merely something that would
be low enough to be deemed reasonable.
For anybody trying to replicate this, you can do a simple test, substitute the
path to your exim binary:
$ perl -e '$items=970; $count=1; print "x\@test.ex: "; while($count <
$items){print "test$count.ex,"; $count++;}; print "test$count.ex\n";' >
/tmp/forwardtable
$ ../src/build-Linux-i386/exim -be '${if match{${lookup{x@???}
lsearch*@{/tmp/forwardtable}}}{^(.)*@(.)*\$} {true}{false}}'
Segmentation fault (core dumped)
$ perl -e '$items=969; $count=1; print "x\@test.ex: "; while($count <
$items){print "test$count.ex,"; $count++;}; print "test$count.ex\n";' >
/tmp/forwardtable
$ ../src/build-Linux-i386/exim -be '${if match{${lookup{x@???}
lsearch*@{/tmp/forwardtable}}}{^(.)*@(.)*\$} {true}{false}}'
false
--
Configure bugmail:
http://bugs.exim.org/userprefs.cgi?tab=email