summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBenjamin Peterson <benjamin@python.org>2014-10-15 15:47:36 (GMT)
committerBenjamin Peterson <benjamin@python.org>2014-10-15 15:47:36 (GMT)
commite1bd38c03c16cd27227b3148d2be0ef1ab678448 (patch)
tree6ca661c659881b0785ed35ed82bdb9e1d07c6831
parent77a75b3db1b3c63833067f6864e62dcf312ded05 (diff)
downloadcpython-e1bd38c03c16cd27227b3148d2be0ef1ab678448.zip
cpython-e1bd38c03c16cd27227b3148d2be0ef1ab678448.tar.gz
cpython-e1bd38c03c16cd27227b3148d2be0ef1ab678448.tar.bz2
fix integer overflow in unicode case operations (closes #22643)
-rw-r--r--Lib/test/test_unicode.py5
-rw-r--r--Misc/NEWS3
-rw-r--r--Objects/unicodeobject.c5
3 files changed, 13 insertions, 0 deletions
diff --git a/Lib/test/test_unicode.py b/Lib/test/test_unicode.py
index c2ede07..e1ccd5c 100644
--- a/Lib/test/test_unicode.py
+++ b/Lib/test/test_unicode.py
@@ -661,6 +661,11 @@ class UnicodeTest(string_tests.CommonTest,
self.assertEqual('x'.center(4, '\U0010FFFF'),
'\U0010FFFFx\U0010FFFF\U0010FFFF')
+ @unittest.skipUnless(sys.maxsize == 2**31 - 1, "requires 32-bit system")
+ def test_case_operation_overflow(self):
+ # Issue #22643
+ self.assertRaises(OverflowError, ("ΓΌ"*(2**32//12 + 1)).upper)
+
def test_contains(self):
# Testing Unicode contains method
self.assertIn('a', 'abdb')
diff --git a/Misc/NEWS b/Misc/NEWS
index 8fbf58b..7676c90 100644
--- a/Misc/NEWS
+++ b/Misc/NEWS
@@ -10,6 +10,9 @@ What's New in Python 3.3.6?
Core and Builtins
-----------------
+- Issue #22643: Fix integer overflow in Unicode case operations (upper, lower,
+ title, swapcase, casefold).
+
- Issue #22518: Fixed integer overflow issues in "backslashreplace",
"xmlcharrefreplace", and "surrogatepass" error handlers.
diff --git a/Objects/unicodeobject.c b/Objects/unicodeobject.c
index 1ce5caa..35da457 100644
--- a/Objects/unicodeobject.c
+++ b/Objects/unicodeobject.c
@@ -9484,6 +9484,11 @@ case_operation(PyObject *self,
kind = PyUnicode_KIND(self);
data = PyUnicode_DATA(self);
length = PyUnicode_GET_LENGTH(self);
+ if (length > PY_SSIZE_T_MAX / 3 ||
+ length > PY_SIZE_MAX / (3 * sizeof(Py_UCS4))) {
+ PyErr_SetString(PyExc_OverflowError, "string is too long");
+ return NULL;
+ }
tmp = PyMem_MALLOC(sizeof(Py_UCS4) * 3 * length);
if (tmp == NULL)
return PyErr_NoMemory();