Message92476
The patch is incorrect. Why do you think there is an overflow? There is
none in the call to ParseTuple: the i argument parser expects a signed
int*; passing a long* will break on systems where
sizeof(int)!=sizeof(long) (such as typical 64-bit Unix).
In addition, the *actual* overflow in the current code (casting to uid_t)
is not handled in the patch. |
|
Date |
User |
Action |
Args |
2009-09-10 09:03:25 | loewis | set | recipients:
+ loewis, vstinner, boya |
2009-09-10 09:03:25 | loewis | set | messageid: <1252573405.03.0.794294146738.issue6873@psf.upfronthosting.co.za> |
2009-09-10 09:03:24 | loewis | link | issue6873 messages |
2009-09-10 09:03:23 | loewis | create | |
|