Eric V. Smith <e...@trueblade.com> added the comment:

Thank you for posting this.

Some of these look like false positives.

For example:
#263
Parser/string_parser.c:670: error: Uninitialized Value
  The value read from parenstack[_] was never initialized.
  668.             }
  669.             nested_depth--;
  670.             int opening = (unsigned char)parenstack[nested_depth];
                   ^
  671.             if (!((opening == '(' && ch == ')') ||
  672.                   (opening == '[' && ch == ']') ||

I don't see how this could be an uninitialized read, although I'm willing to be 
wrong.

If your tool can produce patches to fix reported problems, I suggest that you 
create PRs for specific issues, so they can be reviewed individually. There's 
no way we'd review a single patch for all 673 issues that were identified.

Also, looking at the first one:
#0
Objects/clinic/bytearrayobject.c.h:50: error: Dead Store
  The value written to &noptargs (type long) is never used.
  48.             goto exit;
  49.         }
  50.         if (!--noptargs) {
                   ^
  51.             goto skip_optional_pos;
  52.         }

We've discussed this before. The consensus last time was to leave code like 
this in place, in case other code was added after this that refers to the same 
pointer. Our assumption is that compilers will remove the unneeded store. Is it 
possible to remove Dead Stores from the output, and/or produce a separate 
output with just Dead Stores? I don't see how a Dead Store can be a 
vulnerability.

----------
nosy: +eric.smith -414039482

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue46280>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to