[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[bug #64229] [troff] I haz a DoS attack
From: |
G. Branden Robinson |
Subject: |
[bug #64229] [troff] I haz a DoS attack |
Date: |
Wed, 24 May 2023 09:11:19 -0400 (EDT) |
Follow-up Comment #4, bug #64229 (project groff):
[comment #3 comment #3:]
> "Infinite input causes infinite execution time and consumes infinite
resources" doesn't particularly surprise me. Do other command-line utilities
fare any better? Things like "cat" and "grep" have the luxury of being able
to emit output before all input has been read, but "yes abcdefghijklm | sort"
seemed happy to churn the CPU as long as I'd let it.
It's not *that* this fails that concerns me so much as the failure *mode*.
In all of these cases the formatter got nuked by the kernel OOM killer. This
means an uncontrolled crash.
I don't know what other _troff_s will do (perhaps nothing), but I think GNU
_troff_ should be sensitive to diversion content reaching a vertical page
location near INT_MAX in basic units and fatal() out.
_______________________________________________________
Reply to this item at:
<https://savannah.gnu.org/bugs/?64229>
_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/