------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugs.exim.org/show_bug.cgi?id=1403 Todd Lyons <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|[email protected] |[email protected] --- Comment #6 from Todd Lyons <[email protected]> 2013-10-25 16:39:09 --- I did want to add the comment that this is only the first *potential* patch I intend to submit for review. The other plan of attack is to call pcre_exec() with a match limit, possibly a computed value, or merely something that would be low enough to be deemed reasonable. For anybody trying to replicate this, you can do a simple test, substitute the path to your exim binary: $ perl -e '$items=970; $count=1; print "x\@test.ex: "; while($count < $items){print "test$count.ex,"; $count++;}; print "test$count.ex\n";' > /tmp/forwardtable $ ../src/build-Linux-i386/exim -be '${if match{${lookup{[email protected]} lsearch*@{/tmp/forwardtable}}}{^(.)*@(.)*\$} {true}{false}}' Segmentation fault (core dumped) $ perl -e '$items=969; $count=1; print "x\@test.ex: "; while($count < $items){print "test$count.ex,"; $count++;}; print "test$count.ex\n";' > /tmp/forwardtable $ ../src/build-Linux-i386/exim -be '${if match{${lookup{[email protected]} lsearch*@{/tmp/forwardtable}}}{^(.)*@(.)*\$} {true}{false}}' false -- Configure bugmail: http://bugs.exim.org/userprefs.cgi?tab=email -- ## List details at https://lists.exim.org/mailman/listinfo/exim-dev Exim details at http://www.exim.org/ ##
