http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5486





------- Additional Comments From [EMAIL PROTECTED]  2007-05-31 03:43 -------
I can confirm that the following rule from 70_sare_obfu1.cf
causes a Perl segmentation violation on Linux (v5.8.8 built for 
x86_64-linux-thread-multi) with SA 3.2.0 as run from a
command line (spamassassin -t -D -L <msg):

rawbody   __SARE_OBFU_TBL3         /<td(?:[^>'"]|"[^"]*"|'[^']*')*>(?:<(?!
\/?td)(?:[^>'"]|"[^"]*"|'[^']*')*>){0,5}(?:[a-z]|&[a-z];){3}(?:<(?!\/?td)(?:
[^>'"]|"[^"]*"|'[^']*')*>){0,5}<\/td(?:[^>'"]|"[^"]*"|'[^']*')*>/i

It does not crash on FreeBSD, and it does not crash with SA 3.1.8
on the same Linux with the same Perl.

A problem message (one of the three) was supplied by Claude Frantz
and is a newsletter in HTML with lots of nested tables, 3000+ lines.
I don't know if it may be attached as a test case, I hope Claude
will be allowed to submit it. I managed to strip it down to 1600
lines by removing some of the nested tables and plain text part,
but can't boil it down to a simple test case.


Claude believes it is related to the Perl bug:
  http://rt.perl.org/rt3/Public/Bug/Display.html?id=40654

That particular test case from #40654 does cause a Segmentation fault
on the same machine (not every time):
  perl -le '(qq["Joe\" <email>,\n\t] x 20000) =~ m{[^\n]+(?:[^\n]*\n)*}s'
but not on our FreeBSD hosts with perl 5.8.8 from ports.




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to