From 646e27faa965ad61f85d06b28df85236eb9bbce1 Mon Sep 17 00:00:00 2001 From: KIMDONGYEON00 Date: Tue, 15 Jul 2025 01:50:17 +0900 Subject: [PATCH] CVE-2024-45492 --- third_party/python/Modules/expat/xmlparse.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/third_party/python/Modules/expat/xmlparse.c b/third_party/python/Modules/expat/xmlparse.c index 7c1720b9d..0fb9971bc 100644 --- a/third_party/python/Modules/expat/xmlparse.c +++ b/third_party/python/Modules/expat/xmlparse.c @@ -6145,6 +6145,15 @@ static int nextScaffoldPart(XML_Parser parser) { int next; if (!dtd->scaffIndex) { + /* Detect and prevent integer overflow. + * The preprocessor guard addresses the "always false" warning + * from -Wtype-limits on platforms where + * sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */ +#if UINT_MAX >= SIZE_MAX + if (parser->m_groupSize > ((size_t)(-1) / sizeof(int))) { + return -1; + } +#endif dtd->scaffIndex = (int *)MALLOC(parser, parser->m_groupSize * sizeof(int)); if (!dtd->scaffIndex) return -1; dtd->scaffIndex[0] = 0;