Message171657
| Author |
serhiy.storchaka |
| Recipients |
mark.dickinson, serhiy.storchaka |
| Date |
2012年09月30日.18:34:09 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1349030051.26.0.323672452753.issue16096@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
In several places such dungerous code used to check the integer overflow:
size = n * itemsize;
if (size / itemsize != n) raise exception...
Because these values are signed, this results in undefined behavior.
The proposed patches replace similar unsafe code to safe one. Note that the patches for the different versions are substantially different. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2012年09月30日 18:34:11 | serhiy.storchaka | set | recipients:
+ serhiy.storchaka, mark.dickinson |
| 2012年09月30日 18:34:11 | serhiy.storchaka | set | messageid: <1349030051.26.0.323672452753.issue16096@psf.upfronthosting.co.za> |
| 2012年09月30日 18:34:11 | serhiy.storchaka | link | issue16096 messages |
| 2012年09月30日 18:34:10 | serhiy.storchaka | create |
|