summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMark Dickinson <dickinsm@gmail.com>2010-06-11 19:50:30 (GMT)
committerMark Dickinson <dickinsm@gmail.com>2010-06-11 19:50:30 (GMT)
commitb72e6860d800dea696f541e6490c5ee08aeee14c (patch)
treebb4338353723e43df5d3bccb4dc8e92696fbe725
parent2e5416d0e68ed9526ec11de053c3cfeaffdb0620 (diff)
downloadcpython-b72e6860d800dea696f541e6490c5ee08aeee14c.zip
cpython-b72e6860d800dea696f541e6490c5ee08aeee14c.tar.gz
cpython-b72e6860d800dea696f541e6490c5ee08aeee14c.tar.bz2
Fix more undefined-behaviour inducing overflow checks in struct module.
-rw-r--r--Lib/test/test_struct.py2
-rw-r--r--Modules/_struct.c42
2 files changed, 25 insertions, 19 deletions
diff --git a/Lib/test/test_struct.py b/Lib/test/test_struct.py
index 70eed6e..d574bd7 100644
--- a/Lib/test/test_struct.py
+++ b/Lib/test/test_struct.py
@@ -510,6 +510,8 @@ class StructTest(unittest.TestCase):
hugecount = '{}b'.format(sys.maxsize+1)
self.assertRaises(struct.error, struct.calcsize, hugecount)
+ hugecount2 = '{}b{}H'.format(sys.maxsize//2, sys.maxsize//2)
+ self.assertRaises(struct.error, struct.calcsize, hugecount2)
if IS32BIT:
def test_crasher(self):
diff --git a/Modules/_struct.c b/Modules/_struct.c
index 5113b93..87387bd 100644
--- a/Modules/_struct.c
+++ b/Modules/_struct.c
@@ -1143,16 +1143,19 @@ getentry(int c, const formatdef *f)
}
-/* Align a size according to a format code */
+/* Align a size according to a format code. Return -1 on overflow. */
static Py_ssize_t
align(Py_ssize_t size, char c, const formatdef *e)
{
+ Py_ssize_t extra;
+
if (e->format == c) {
- if (e->alignment) {
- size = ((size + e->alignment - 1)
- / e->alignment)
- * e->alignment;
+ if (e->alignment && size > 0) {
+ extra = (e->alignment - 1) - (size - 1) % (e->alignment);
+ if (extra > PY_SSIZE_T_MAX - size)
+ return -1;
+ size += extra;
}
}
return size;
@@ -1171,7 +1174,7 @@ prepare_s(PyStructObject *self)
const char *s;
const char *fmt;
char c;
- Py_ssize_t size, len, num, itemsize, x;
+ Py_ssize_t size, len, num, itemsize;
fmt = PyBytes_AS_STRING(self->s_format);
@@ -1190,12 +1193,8 @@ prepare_s(PyStructObject *self)
if (num*10 + (c - '0') > PY_SSIZE_T_MAX) { ... } */
if (num >= PY_SSIZE_T_MAX / 10 && (
num > PY_SSIZE_T_MAX / 10 ||
- (c - '0') > PY_SSIZE_T_MAX % 10)) {
- PyErr_SetString(
- StructError,
- "overflow in item count");
- return -1;
- }
+ (c - '0') > PY_SSIZE_T_MAX % 10))
+ goto overflow;
num = num*10 + (c - '0');
}
if (c == '\0') {
@@ -1220,13 +1219,13 @@ prepare_s(PyStructObject *self)
itemsize = e->size;
size = align(size, c, e);
- x = num * itemsize;
- size += x;
- if (x/itemsize != num || size < 0) {
- PyErr_SetString(StructError,
- "total struct size too long");
- return -1;
- }
+ if (size == -1)
+ goto overflow;
+
+ /* if (size + num * itemsize > PY_SSIZE_T_MAX) { ... } */
+ if (num > (PY_SSIZE_T_MAX - size) / itemsize)
+ goto overflow;
+ size += num * itemsize;
}
/* check for overflow */
@@ -1285,6 +1284,11 @@ prepare_s(PyStructObject *self)
codes->size = 0;
return 0;
+
+ overflow:
+ PyErr_SetString(StructError,
+ "total struct size too long");
+ return -1;
}
static PyObject *