New submission from Serhiy Storchaka <storch...@gmail.com>:

In unicodeobject.c and stringlib aligned addresses and sizes are used for 
optimization. pointer->integer and implicit integer->integer conversions may 
overflow or underflow on platforms with sizeof(size_t) != sizeof(void *) or 
sizeof(size_t) != sizeof(int). The proposed patch fixes such unsafe things in 
unicodeobject.c, stringlib and some other files.

There are still a few unsafe places in libffi, but in this library Py_uintptr_t 
nor uintptr_t are not available.

----------
components: Interpreter Core
files: align_operations.patch
keywords: patch
messages: 163473
nosy: storchaka
priority: normal
severity: normal
status: open
title: Possible integer overflow in operations with addresses and sizes.
type: security
versions: Python 3.3
Added file: http://bugs.python.org/file26091/align_operations.patch

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue15144>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to