Blame SOURCES/00193-buffer-overflow.patch

925e6b
925e6b
# HG changeset patch
925e6b
# User Benjamin Peterson <benjamin@python.org>
925e6b
# Date 1389671978 18000
925e6b
# Node ID 87673659d8f7ba1623cd4914f09ad3d2ade034e9
925e6b
# Parent  2631d33ee7fbd5f0288931ef37872218d511d2e8
925e6b
complain when nbytes > buflen to fix possible buffer overflow (closes #20246)
925e6b
925e6b
diff --git a/Lib/test/test_socket.py b/Lib/test/test_socket.py
925e6b
--- a/Lib/test/test_socket.py
925e6b
+++ b/Lib/test/test_socket.py
925e6b
@@ -1620,6 +1620,16 @@ class BufferIOTest(SocketConnectedTest):
925e6b
 
925e6b
     _testRecvFromIntoMemoryview = _testRecvFromIntoArray
925e6b
 
925e6b
+    def testRecvFromIntoSmallBuffer(self):
925e6b
+        # See issue #20246.
925e6b
+        buf = bytearray(8)
925e6b
+        self.assertRaises(ValueError, self.cli_conn.recvfrom_into, buf, 1024)
925e6b
+
925e6b
+    def _testRecvFromIntoSmallBuffer(self):
925e6b
+        with test_support.check_py3k_warnings():
925e6b
+            buf = buffer(MSG*2048)
925e6b
+        self.serv_conn.send(buf)
925e6b
+
925e6b
 
925e6b
 TIPC_STYPE = 2000
925e6b
 TIPC_LOWER = 200
925e6b
diff --git a/Modules/socketmodule.c b/Modules/socketmodule.c
925e6b
--- a/Modules/socketmodule.c
925e6b
+++ b/Modules/socketmodule.c
925e6b
@@ -2742,6 +2742,10 @@ sock_recvfrom_into(PySocketSockObject *s
925e6b
     if (recvlen == 0) {
925e6b
         /* If nbytes was not specified, use the buffer's length */
925e6b
         recvlen = buflen;
925e6b
+    } else if (recvlen > buflen) {
925e6b
+        PyErr_SetString(PyExc_ValueError,
925e6b
+                        "nbytes is greater than the length of the buffer");
925e6b
+        goto error;
925e6b
     }
925e6b
 
925e6b
     readlen = sock_recvfrom_guts(s, buf.buf, recvlen, flags, &addr);
925e6b