[Bug 1593318] CVE-2018-12558 perl-Email-Address: Specially crafted input could cause Denial of Service due to complex parse() method

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1593318



--- Comment #6 from Petr Pisar <ppisar@xxxxxxxxxx> ---
Email-Address-1.910 (1.911 and 1.912 updates a documentation) fixes this
vulnerability by extensive use of independent subexpressions ("(?>pattern)"
constructs) that prevents from undesired backtracking. An excerpt from the fix:

-my $cfws           = qr/$comment|\s+/;
+my $cfws           = qr/$comment|(?>\s+)/;


The exponential backtracking is the cause of this vulnerability and is indeed
fixed:

[test@fedora-30 Email-Address-1.912]$ time perl -Ilib -e 'use Email::Address;
Email::Address->parse("\f" x 30)'

real    0m0.017s
user    0m0.010s
sys     0m0.007s

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]

  Powered by Linux