[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Chicken-hackers] [PATCH] [SECURITY] Update irregex to upstream 0.9.6

From: Peter Bex
Subject: [Chicken-hackers] [PATCH] [SECURITY] Update irregex to upstream 0.9.6
Date: Wed, 14 Dec 2016 20:39:18 +0100
User-agent: Mutt/1.5.23 (2014-03-12)

Hi all,

Attached is a patch to update irregex to the upstream version of 0.9.6.

When compiling an absurdly nested regex like 
the engine would consume gigabytes of memory.

The reason is that (+ foo) would be rewritten to (seq foo (* foo)),
causing the regex to become twice as large.  If the nested regex itself
also contains +, this happens recursively.  Each subexpression
will be compiled to a backtracking matcher, building up closures, which
eats up even more memory than just the SRE list representation.

The fix is to handle + "natively" instead of rewriting it.  The patch
also refactors * in terms of + (it is simply + with a failure
continuation that carries on matching the next expression).

The patch also includes two small changes by Sudarshan S. Chawathe,
who improved the clarity of the documentation (sre->string generates
a PCRE regex pattern, not a POSIX pattern) and fixed a small bug in
the sre matcher of sre->string: (sre->string '(seq)) will give an
error "(cddr) bad argument type: ()" instead of returning "" as an
empty sequence should.


Attachment: 0001-Update-irregex-to-upstream-0.9.6.master.patch
Description: Text Data

Attachment: 0001-Update-irregex-to-upstream-0.9.6.chicken-5.patch
Description: Text Data

Attachment: signature.asc
Description: Digital signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]