diff options
author | Tim Peters <tim.peters@gmail.com> | 2001-04-10 01:54:42 (GMT) |
---|---|---|
committer | Tim Peters <tim.peters@gmail.com> | 2001-04-10 01:54:42 (GMT) |
commit | bfa18f711f01477b143aab37921eafabc0cb38fb (patch) | |
tree | 49824803bd8fe4e92cec93e59b74061feef1f000 /Modules/pcremodule.c | |
parent | 4e6a7a626de58887c270461a546cde5f435e6178 (diff) | |
download | cpython-bfa18f711f01477b143aab37921eafabc0cb38fb.zip cpython-bfa18f711f01477b143aab37921eafabc0cb38fb.tar.gz cpython-bfa18f711f01477b143aab37921eafabc0cb38fb.tar.bz2 |
Critical fix: if cPickle on a sizeof(long)==8 box is used to read a
binary pickle, and the latter contains a pickle of a negative Python
int i written on a sizeof(long)==4 box (and whether by cPickle or
pickle.py), it's read incorrectly as i + 2**32. The patch repairs that,
and allows test_cpickle.py (to which I added a relevant test case earlier
today) to work again on sizeof(long)==8 boxes.
There's another (at least one) sizeof(long)==8 binary pickle bug, but in
pickle.py instead. That bug is still there, and test_pickle.py doesn't
catch it yet (try pickling and unpickling, e.g., 1 << 46).
Diffstat (limited to 'Modules/pcremodule.c')
0 files changed, 0 insertions, 0 deletions