diff options
| author | Bénédikt Tran <10796600+picnixz@users.noreply.github.com> | 2025-10-07 11:33:40 (GMT) |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2025-10-07 11:33:40 (GMT) |
| commit | 7bb51bd5bef5b27d5619c11cb51686ebe22726db (patch) | |
| tree | 716c2bbeacefa86474cc80cd0876c5c6424d88ea /Python/Python-tokenize.c | |
| parent | be8f3a68f4df6251ae6b9b8e965861686a8909f1 (diff) | |
| download | cpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.zip cpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.tar.gz cpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.tar.bz2 | |
[3.13] gh-139283: correctly handle `size` limit in `cursor.fetchmany()` (GH-139296) (#139444)
Passing a negative or zero size to `cursor.fetchmany()` made it fetch all rows
instead of none.
While this could be considered a security vulnerability, it was decided to treat
this issue as a regular bug as passing a non-sanitized *size* value in the first
place is not recommended.
(cherry picked from commit bc172ee8307431caf4c89612e9e454081635191f)
Diffstat (limited to 'Python/Python-tokenize.c')
0 files changed, 0 insertions, 0 deletions
