Blame SOURCES/00199-CVE-2013-1753.patch

925e6b
925e6b
# HG changeset patch
925e6b
# User Benjamin Peterson <benjamin@python.org>
925e6b
# Date 1417828515 18000
925e6b
# Node ID d50096708b2d701937e78f525446d729fc28db88
925e6b
# Parent  923aac88a3cc76a95d5a04d9d3ece245147a8064
925e6b
add a default limit for the amount of data xmlrpclib.gzip_decode will return (closes #16043)
925e6b
925e6b
diff --git a/Lib/test/test_xmlrpc.py b/Lib/test/test_xmlrpc.py
925e6b
--- a/Lib/test/test_xmlrpc.py
925e6b
+++ b/Lib/test/test_xmlrpc.py
925e6b
@@ -737,7 +737,7 @@ class GzipServerTestCase(BaseServerTestC
925e6b
         with cm:
925e6b
             p.pow(6, 8)
925e6b
 
925e6b
-    def test_gsip_response(self):
925e6b
+    def test_gzip_response(self):
925e6b
         t = self.Transport()
925e6b
         p = xmlrpclib.ServerProxy(URL, transport=t)
925e6b
         old = self.requestHandler.encode_threshold
925e6b
@@ -750,6 +750,23 @@ class GzipServerTestCase(BaseServerTestC
925e6b
         self.requestHandler.encode_threshold = old
925e6b
         self.assertTrue(a>b)
925e6b
 
925e6b
+    def test_gzip_decode_limit(self):
925e6b
+        max_gzip_decode = 20 * 1024 * 1024
925e6b
+        data = '\0' * max_gzip_decode
925e6b
+        encoded = xmlrpclib.gzip_encode(data)
925e6b
+        decoded = xmlrpclib.gzip_decode(encoded)
925e6b
+        self.assertEqual(len(decoded), max_gzip_decode)
925e6b
+
925e6b
+        data = '\0' * (max_gzip_decode + 1)
925e6b
+        encoded = xmlrpclib.gzip_encode(data)
925e6b
+
925e6b
+        with self.assertRaisesRegexp(ValueError,
925e6b
+                                     "max gzipped payload length exceeded"):
925e6b
+            xmlrpclib.gzip_decode(encoded)
925e6b
+
925e6b
+        xmlrpclib.gzip_decode(encoded, max_decode=-1)
925e6b
+
925e6b
+
925e6b
 #Test special attributes of the ServerProxy object
925e6b
 class ServerProxyTestCase(unittest.TestCase):
925e6b
     def setUp(self):
925e6b
diff --git a/Lib/xmlrpclib.py b/Lib/xmlrpclib.py
925e6b
--- a/Lib/xmlrpclib.py
925e6b
+++ b/Lib/xmlrpclib.py
925e6b
@@ -49,6 +49,7 @@
925e6b
 # 2003-07-12 gp  Correct marshalling of Faults
925e6b
 # 2003-10-31 mvl Add multicall support
925e6b
 # 2004-08-20 mvl Bump minimum supported Python version to 2.1
925e6b
+# 2014-12-02 ch/doko  Add workaround for gzip bomb vulnerability
925e6b
 #
925e6b
 # Copyright (c) 1999-2002 by Secret Labs AB.
925e6b
 # Copyright (c) 1999-2002 by Fredrik Lundh.
925e6b
@@ -1165,10 +1166,13 @@ def gzip_encode(data):
925e6b
 # in the HTTP header, as described in RFC 1952
925e6b
 #
925e6b
 # @param data The encoded data
925e6b
+# @keyparam max_decode Maximum bytes to decode (20MB default), use negative
925e6b
+#    values for unlimited decoding
925e6b
 # @return the unencoded data
925e6b
 # @raises ValueError if data is not correctly coded.
925e6b
+# @raises ValueError if max gzipped payload length exceeded
925e6b
 
925e6b
-def gzip_decode(data):
925e6b
+def gzip_decode(data, max_decode=20971520):
925e6b
     """gzip encoded data -> unencoded data
925e6b
 
925e6b
     Decode data using the gzip content encoding as described in RFC 1952
925e6b
@@ -1178,11 +1182,16 @@ def gzip_decode(data):
925e6b
     f = StringIO.StringIO(data)
925e6b
     gzf = gzip.GzipFile(mode="rb", fileobj=f)
925e6b
     try:
925e6b
-        decoded = gzf.read()
925e6b
+        if max_decode < 0: # no limit
925e6b
+            decoded = gzf.read()
925e6b
+        else:
925e6b
+            decoded = gzf.read(max_decode + 1)
925e6b
     except IOError:
925e6b
         raise ValueError("invalid data")
925e6b
     f.close()
925e6b
     gzf.close()
925e6b
+    if max_decode >= 0 and len(decoded) > max_decode:
925e6b
+        raise ValueError("max gzipped payload length exceeded")
925e6b
     return decoded
925e6b
 
925e6b
 ##