This issue tracker has been migrated to GitHub ,
and is currently read-only.
For more information,
see the GitHub FAQs in the Python's Developer Guide.
Created on 2021年09月17日 06:56 by serhiy.storchaka, last changed 2022年04月11日 14:59 by admin. This issue is now closed.
| Files | ||||
|---|---|---|---|---|
| File name | Uploaded | Description | Edit | |
| J1939Test.log | serhiy.storchaka, 2021年09月17日 06:56 | |||
| Pull Requests | |||
|---|---|---|---|
| URL | Status | Linked | Edit |
| PR 28404 | merged | serhiy.storchaka, 2021年09月17日 07:03 | |
| PR 28406 | merged | miss-islington, 2021年09月17日 08:46 | |
| PR 28407 | merged | miss-islington, 2021年09月17日 08:46 | |
| Messages (4) | |||
|---|---|---|---|
| msg402003 - (view) | Author: Serhiy Storchaka (serhiy.storchaka) * (Python committer) | Date: 2021年09月17日 06:56 | |
It can be reproduced when run test.test_socket.J1939Test (omitted in regrtests now, see issue45187) with Address Sanitizer. See for example https://github.com/python/cpython/pull/28317/checks?check_run_id=3625390397. It can be reproduced when run test.test_socket.J1939Test with unittest: $ ./python -m unittest -v test.test_socket -k J1939Test See J1939Test.log for output. The cause is using PyArg_ParseTuple() with format unit "k" (unsigned long) and variable of type uint32_t. PyArg_ParseTuple() should only be used with native integer types (short, int, long, long long), it does not support support types of fixed size (uint16_t, uint32_t, uint64_t). |
|||
| msg402011 - (view) | Author: Serhiy Storchaka (serhiy.storchaka) * (Python committer) | Date: 2021年09月17日 08:46 | |
New changeset 773319545ba60577bc140aa46eac83b360240b7a by Serhiy Storchaka in branch 'main': bpo-45228: Fix stack buffer overflow in parsing J1939 address (GH-28404) https://github.com/python/cpython/commit/773319545ba60577bc140aa46eac83b360240b7a |
|||
| msg402013 - (view) | Author: miss-islington (miss-islington) | Date: 2021年09月17日 09:09 | |
New changeset 62c74f34e7541cf5c9780661b260c53617291804 by Miss Islington (bot) in branch '3.10': bpo-45228: Fix stack buffer overflow in parsing J1939 address (GH-28404) https://github.com/python/cpython/commit/62c74f34e7541cf5c9780661b260c53617291804 |
|||
| msg402015 - (view) | Author: miss-islington (miss-islington) | Date: 2021年09月17日 09:10 | |
New changeset 98fef200bbfd8adec27799265deb200ab5e4513e by Miss Islington (bot) in branch '3.9': bpo-45228: Fix stack buffer overflow in parsing J1939 address (GH-28404) https://github.com/python/cpython/commit/98fef200bbfd8adec27799265deb200ab5e4513e |
|||
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2022年04月11日 14:59:50 | admin | set | github: 89391 |
| 2021年09月17日 11:51:16 | serhiy.storchaka | set | status: open -> closed resolution: fixed stage: patch review -> resolved |
| 2021年09月17日 09:10:58 | miss-islington | set | messages: + msg402015 |
| 2021年09月17日 09:09:34 | miss-islington | set | messages: + msg402013 |
| 2021年09月17日 08:46:32 | miss-islington | set | pull_requests: + pull_request26819 |
| 2021年09月17日 08:46:29 | miss-islington | set | nosy:
+ miss-islington pull_requests: + pull_request26818 |
| 2021年09月17日 08:46:26 | serhiy.storchaka | set | messages: + msg402011 |
| 2021年09月17日 07:03:42 | serhiy.storchaka | set | keywords:
+ patch stage: patch review pull_requests: + pull_request26816 |
| 2021年09月17日 07:01:34 | serhiy.storchaka | set | versions: + Python 3.9, Python 3.10 |
| 2021年09月17日 06:57:18 | serhiy.storchaka | link | issue45187 dependencies |
| 2021年09月17日 06:56:42 | serhiy.storchaka | create | |