prevent integer overflow in escape_unicode (closes #24522)

This commit is contained in:
Benjamin Peterson 2015-06-27 15:01:51 -05:00
parent 758d60baaa
commit 7b78d4364d
2 changed files with 11 additions and 3 deletions

View File

@ -24,6 +24,8 @@ Core and Builtins
Library
-------
- Issue #24522: Fix possible integer overflow in json accelerator module.
- Issue #24489: ensure a previously set C errno doesn't disturb cmath.polar().
- Issue #24408: Fixed AttributeError in measure() and metrics() methods of

View File

@ -249,17 +249,23 @@ escape_unicode(PyObject *pystr)
/* Compute the output size */
for (i = 0, output_size = 2; i < input_chars; i++) {
Py_UCS4 c = PyUnicode_READ(kind, input, i);
Py_ssize_t d;
switch (c) {
case '\\': case '"': case '\b': case '\f':
case '\n': case '\r': case '\t':
output_size += 2;
d = 2;
break;
default:
if (c <= 0x1f)
output_size += 6;
d = 6;
else
output_size++;
d = 1;
}
if (output_size > PY_SSIZE_T_MAX - d) {
PyErr_SetString(PyExc_OverflowError, "string is too long to escape");
return NULL;
}
output_size += d;
}
rval = PyUnicode_New(output_size, maxchar);