bug-groff
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[bug #64229] [troff] I haz a DoS attack


From: G. Branden Robinson
Subject: [bug #64229] [troff] I haz a DoS attack
Date: Wed, 24 May 2023 09:11:19 -0400 (EDT)

Follow-up Comment #4, bug #64229 (project groff):


[comment #3 comment #3:]
> "Infinite input causes infinite execution time and consumes infinite
resources" doesn't particularly surprise me.  Do other command-line utilities
fare any better?  Things like "cat" and "grep" have the luxury of being able
to emit output before all input has been read, but "yes abcdefghijklm | sort"
seemed happy to churn the CPU as long as I'd let it.

It's not *that* this fails that concerns me so much as the failure *mode*.

In all of these cases the formatter got nuked by the kernel OOM killer.  This
means an uncontrolled crash.

I don't know what other _troff_s will do (perhaps nothing), but I think GNU
_troff_ should be sensitive to diversion content reaching a vertical page
location near INT_MAX in basic units and fatal() out.


    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/bugs/?64229>

_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/




reply via email to

[Prev in Thread] Current Thread [Next in Thread]