Message92476
| Author |
loewis |
| Recipients |
boya, loewis, vstinner |
| Date |
2009年09月10日.09:03:23 |
| SpamBayes Score |
1.772507e-06 |
| Marked as misclassified |
No |
| Message-id |
<1252573405.03.0.794294146738.issue6873@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
The patch is incorrect. Why do you think there is an overflow? There is
none in the call to ParseTuple: the i argument parser expects a signed
int*; passing a long* will break on systems where
sizeof(int)!=sizeof(long) (such as typical 64-bit Unix).
In addition, the *actual* overflow in the current code (casting to uid_t)
is not handled in the patch. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2009年09月10日 09:03:25 | loewis | set | recipients:
+ loewis, vstinner, boya |
| 2009年09月10日 09:03:25 | loewis | set | messageid: <1252573405.03.0.794294146738.issue6873@psf.upfronthosting.co.za> |
| 2009年09月10日 09:03:24 | loewis | link | issue6873 messages |
| 2009年09月10日 09:03:23 | loewis | create |
|