diff options
| author | Yukihiro "Matz" Matsumoto <[email protected]> | 2018-11-15 02:03:54 +0900 |
|---|---|---|
| committer | Yukihiro "Matz" Matsumoto <[email protected]> | 2018-11-15 02:03:54 +0900 |
| commit | 4550f4e38153c623537e6df53a4fe7c1c063adc0 (patch) | |
| tree | 96b0e2f09a7600db1b7b35910c1cc09d2040a8df /mrbgems/mruby-string-ext | |
| parent | c3188cac431225fda48718f309ad3d9318a6e44f (diff) | |
| download | mruby-4550f4e38153c623537e6df53a4fe7c1c063adc0.tar.gz mruby-4550f4e38153c623537e6df53a4fe7c1c063adc0.zip | |
Pattern length may overflow `uint16_t`; fixed #4163
The issue is reported by `https://hackerone.com/dgaletic`.
Diffstat (limited to 'mrbgems/mruby-string-ext')
| -rw-r--r-- | mrbgems/mruby-string-ext/src/string.c | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/mrbgems/mruby-string-ext/src/string.c b/mrbgems/mruby-string-ext/src/string.c index 460c8509e..cfc194906 100644 --- a/mrbgems/mruby-string-ext/src/string.c +++ b/mrbgems/mruby-string-ext/src/string.c @@ -282,7 +282,7 @@ tr_parse_pattern(mrb_state *mrb, struct tr_pattern *ret, const mrb_value v_patte mrb_int pattern_length = RSTRING_LEN(v_pattern); mrb_bool flag_reverse = FALSE; struct tr_pattern *pat1; - int i = 0; + mrb_int i = 0; if(flag_reverse_enable && pattern_length >= 2 && pattern[0] == '^') { flag_reverse = TRUE; @@ -313,8 +313,8 @@ tr_parse_pattern(mrb_state *mrb, struct tr_pattern *ret, const mrb_value v_patte } else { /* in order pattern. */ - int start_pos = i++; - int len; + mrb_int start_pos = i++; + mrb_int len; while (i < pattern_length) { if ((i+2) < pattern_length && pattern[i] != '\\' && pattern[i+1] == '-') @@ -323,6 +323,9 @@ tr_parse_pattern(mrb_state *mrb, struct tr_pattern *ret, const mrb_value v_patte } len = i - start_pos; + if (len > UINT16_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "tr pattern too long (max 65536)"); + } if (pat1 == NULL && ret) { goto nomem; } |
