GNU bug report logs -
#35256
Bug report for -W argument (maximum width) - minor and not dangerous
Previous Next
Reported by: alec <at> unifiedmathematics.com
Date: Sat, 13 Apr 2019 15:33:02 UTC
Severity: normal
Done: Paul Eggert <eggert <at> cs.ucla.edu>
Bug is archived. No further changes may be made.
Full log
Message #10 received at 35256-done <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
alec <at> unifiedmathematics.com wrote:
> I know diff is used by A LOT of other programs, some of which are
> web-accessible
I'm afraid that ship sailed a while ago: if you let a remote attacker specify an
arbitrary option to GNU diff there is lots of other trouble you can get into.
For example, the -I option lets the attacker specify a regular expression that
can cause diff to undergo exponential complexity. The general wisdom nowadays is
to not expose command-line operands to attackers.
As for putting in a limit, the GNU Coding Standards say to not impose arbitrary
limits. In some cases there are good reasons to impose a limit anyway but this
one doesn't seem to rise to that level.
You do raise a good point that 'diff' shouldn't treat negative inputs as if they
were large positive inputs, so I installed the attached patch.
Thanks for reporting the problem; your bug report was a pleasure to read.
[0001-diff-don-t-mistreat-N-in-arg-as-a-large-number.patch (text/x-patch, attachment)]
This bug report was last modified 5 years and 327 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.