diff options
author | Benjamin Peterson <benjamin@python.org> | 2015-02-02 02:10:47 (GMT) |
---|---|---|
committer | Benjamin Peterson <benjamin@python.org> | 2015-02-02 02:10:47 (GMT) |
commit | 17845c1786d8659dce42a3b906d0ae31fc1c3dac (patch) | |
tree | 4c351b2469560d399d4bf525e10a77b9a4b83ce2 | |
parent | 021dec1c96801401d07c8b84cb51115de641bce9 (diff) | |
download | cpython-17845c1786d8659dce42a3b906d0ae31fc1c3dac.zip cpython-17845c1786d8659dce42a3b906d0ae31fc1c3dac.tar.gz cpython-17845c1786d8659dce42a3b906d0ae31fc1c3dac.tar.bz2 |
check for overflow in combinations_with_replacement (closes #23365)
-rw-r--r-- | Lib/test/test_itertools.py | 5 | ||||
-rw-r--r-- | Misc/NEWS | 3 | ||||
-rw-r--r-- | Modules/itertoolsmodule.c | 4 |
3 files changed, 12 insertions, 0 deletions
diff --git a/Lib/test/test_itertools.py b/Lib/test/test_itertools.py index cbb1b92..9cd3ad8 100644 --- a/Lib/test/test_itertools.py +++ b/Lib/test/test_itertools.py @@ -213,6 +213,11 @@ class TestBasicOps(unittest.TestCase): self.assertEqual(result, list(cwr1(values, r))) # matches first pure python version self.assertEqual(result, list(cwr2(values, r))) # matches second pure python version + @test_support.bigaddrspacetest + def test_combinations_with_replacement_overflow(self): + with self.assertRaises(OverflowError): + combinations_with_replacement("AA", 2**30) + @test_support.impl_detail("tuple reuse is specific to CPython") def test_combinations_with_replacement_tuple_reuse(self): cwr = combinations_with_replacement @@ -18,6 +18,9 @@ Core and Builtins Library ------- +- Issue #23365: Fixed possible integer overflow in + itertools.combinations_with_replacement. + - Issue #23366: Fixed possible integer overflow in itertools.combinations. - Issue #23191: fnmatch functions that use caching are now threadsafe. diff --git a/Modules/itertoolsmodule.c b/Modules/itertoolsmodule.c index 4eab79c..47a5e8b 100644 --- a/Modules/itertoolsmodule.c +++ b/Modules/itertoolsmodule.c @@ -2346,6 +2346,10 @@ cwr_new(PyTypeObject *type, PyObject *args, PyObject *kwds) goto error; } + if (r > PY_SSIZE_T_MAX/sizeof(Py_ssize_t)) { + PyErr_SetString(PyExc_OverflowError, "r is too big"); + goto error; + } indices = PyMem_Malloc(r * sizeof(Py_ssize_t)); if (indices == NULL) { PyErr_NoMemory(); |