On 22/11/2019 18:17, Giuseppe D'Angelo via Development wrote:
Il 21/11/19 13:13, Robert Loehning ha scritto:
** [https://doc.qt.io/qt-5/qregularexpression.html QRegularExpression]

This should mostly be fuzzing libpcre itself...

Note that users should NEVER use / accept untrusted regular expressions. While we shouldn't crash or exhaust memory, PCREs will happily exhibit exponential backtracking behaviour, thus exposing applications to DOS attacks. There's nothing we can do about that.

Just wondering how one would go about doing that in practice. Is this something QRegularExpression itself may be of assistance with, perhaps by esposing an API that can be used to identify if an expression contains potentially dangerous or heavy expressions?

André


Thanks,

_______________________________________________
Development mailing list
[email protected]
https://lists.qt-project.org/listinfo/development
_______________________________________________
Development mailing list
[email protected]
https://lists.qt-project.org/listinfo/development

Reply via email to