Message92496
| Author |
boya |
| Recipients |
boya, loewis, vstinner |
| Date |
2009年09月10日.17:39:54 |
| SpamBayes Score |
7.5990575e-10 |
| Marked as misclassified |
No |
| Message-id |
<1252604397.41.0.611145254173.issue6873@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Martin,
The reason why I think there is a possible overflow is that according to
issue 5705, uid/gid overflows are fixed in the following functions:
posix_setegid, posix_setreuid(), posix_setregid(), posix_setgid(). So I
think a similar fix should also be applied to the function posix_lchown.
Or did I misunderstand anything?
And you're right. The previous patch is incorrect. I now submitted
another patch that deals with the *actual* overflow of gid and uid.
---
Victor,
I agree that all posix_*chown() functions should also be fixed for the
same overflow problem, and it's a good idea to create callback functions
as you described. But if nobody does that, I can at least created more
patches to fix other posix_*chown() functions. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2009年09月10日 17:39:57 | boya | set | recipients:
+ boya, loewis, vstinner |
| 2009年09月10日 17:39:57 | boya | set | messageid: <1252604397.41.0.611145254173.issue6873@psf.upfronthosting.co.za> |
| 2009年09月10日 17:39:56 | boya | link | issue6873 messages |
| 2009年09月10日 17:39:55 | boya | create |
|