On Wed, Sep 12, 2018 at 09:23:54AM +0200, Tim Rühsen wrote:
(...)
> I stumbled upon the memory consumption (and slowness) a while ago, but
> it seems to be a well-known issue regarding
> https://sourceware.org/glibc/wiki/Security%20Exceptions.
> 
> So, never accept regex patterns from untrusted sources.

The linked document says:

| Consequently, resource exhaustion issues which can be triggered only with
| crafted patterns (either during compilation or execution) are not treated as
| security bugs. **(This does not mean we do not intend to fix such issues as
| regular bugs if possible.)**

So I think it's worth reporting.

If the `regex' implementation of gnulib is the same as glibc, then I think this
report is related: https://sourceware.org/bugzilla/show_bug.cgi?id=20095

Reply via email to