]> git.ipfire.org Git - thirdparty/Python/cpython.git/commitdiff
bpo-36504: Fix signed integer overflow in _ctypes.c's PyCArrayType_new(). (GH-12660...
authorZackery Spytz <zspytz@gmail.com>
Wed, 3 Apr 2019 18:59:51 +0000 (12:59 -0600)
committerSerhiy Storchaka <storchaka@gmail.com>
Wed, 3 Apr 2019 18:59:51 +0000 (21:59 +0300)
(cherry picked from commit 487b73ab39c80157474821ef9083f51e0846bd62)

Lib/ctypes/test/test_arrays.py
Misc/NEWS.d/next/Core and Builtins/2019-04-02-04-10-32.bpo-36504.k_V8Bm.rst [new file with mode: 0644]
Modules/_ctypes/_ctypes.c

index 53859a3e5e9394e8cd4b787495f5334cc6a0e6d4..29fd422a68cc0d33dd659d7cd1c1aeab73f8b787 100644 (file)
@@ -134,6 +134,12 @@ class ArrayTestCase(unittest.TestCase):
         t2 = my_int * 1
         self.assertIs(t1, t2)
 
+    def test_bpo36504_signed_int_overflow(self):
+        # The overflow check in PyCArrayType_new() could cause signed integer
+        # overflow.
+        with self.assertRaises(OverflowError):
+            c_char * sys.maxsize * 2
+
     @unittest.skipUnless(sys.maxsize > 2**32, 'requires 64bit platform')
     @precisionbigmemtest(size=_2G, memuse=1, dry_run=False)
     def test_large_array(self, size):
diff --git a/Misc/NEWS.d/next/Core and Builtins/2019-04-02-04-10-32.bpo-36504.k_V8Bm.rst b/Misc/NEWS.d/next/Core and Builtins/2019-04-02-04-10-32.bpo-36504.k_V8Bm.rst
new file mode 100644 (file)
index 0000000..8ac209d
--- /dev/null
@@ -0,0 +1 @@
+Fix signed integer overflow in _ctypes.c's ``PyCArrayType_new()``.
index 33e224386fb1fb5b0faf1a24b31989a486638ef4..d608100243d8b969ae16bec8de6d4870f1dd7e39 100644 (file)
@@ -1534,7 +1534,7 @@ PyCArrayType_new(PyTypeObject *type, PyObject *args, PyObject *kwds)
     }
 
     itemsize = itemdict->size;
-    if (length * itemsize < 0) {
+    if (length > PY_SSIZE_T_MAX / itemsize) {
         PyErr_SetString(PyExc_OverflowError,
                         "array too large");
         Py_DECREF(stgdict);