Movatterモバイル変換


[0]ホーム

URL:


homepage

Message325128

This issue trackerhas been migrated toGitHub, and is currentlyread-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Authorvstinner
RecipientsJeffrey.Walton, alex, alexandre.vassalotti, deadshort, dmalcolm, donmez, fweimer, jcea, jwilk, loewis, mark.dickinson, martin.panter, matejcik, miss-islington, nnorwitz, pitrou, python-dev, serhiy.storchaka, sir-sigurd, vstinner, xiang.zhang, ztane
Date2018-09-12.07:52:57
SpamBayes Score-1.0
Marked as misclassifiedYes
Message-id<1536738777.18.0.956365154283.issue1621@psf.upfronthosting.co.za>
In-reply-to
Content
I asked if there is an issue. In fact, all Python memory allocators start by checking if the size is larger than PY_SSIZE_T_MAX. Example:void *PyMem_RawMalloc(size_t size){    /*     * Limit ourselves to PY_SSIZE_T_MAX bytes to prevent security holes.     * Most python internals blindly use a signed Py_ssize_t to track     * things without checking for overflows or negatives.     * As size_t is unsigned, checking for size < 0 is not required.     */    if (size > (size_t)PY_SSIZE_T_MAX)        return NULL;    return _PyMem_Raw.malloc(_PyMem_Raw.ctx, size);}
History
DateUserActionArgs
2018-09-12 07:52:57vstinnersetrecipients: +vstinner,loewis,nnorwitz,jcea,mark.dickinson,pitrou,alexandre.vassalotti,donmez,matejcik,jwilk,alex,dmalcolm,python-dev,deadshort,martin.panter,serhiy.storchaka,ztane,fweimer,Jeffrey.Walton,xiang.zhang,sir-sigurd,miss-islington
2018-09-12 07:52:57vstinnersetmessageid: <1536738777.18.0.956365154283.issue1621@psf.upfronthosting.co.za>
2018-09-12 07:52:57vstinnerlinkissue1621 messages
2018-09-12 07:52:57vstinnercreate
Supported byThe Python Software Foundation,
Powered byRoundup
Copyright © 1990-2022,Python Software Foundation
Legal Statements

[8]ページ先頭

©2009-2026 Movatter.jp