summaryrefslogtreecommitdiffstats
path: root/Python/Python-tokenize.c
diff options
context:
space:
mode:
authorBénédikt Tran <10796600+picnixz@users.noreply.github.com>2025-10-07 11:33:40 (GMT)
committerGitHub <noreply@github.com>2025-10-07 11:33:40 (GMT)
commit7bb51bd5bef5b27d5619c11cb51686ebe22726db (patch)
tree716c2bbeacefa86474cc80cd0876c5c6424d88ea /Python/Python-tokenize.c
parentbe8f3a68f4df6251ae6b9b8e965861686a8909f1 (diff)
downloadcpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.zip
cpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.tar.gz
cpython-7bb51bd5bef5b27d5619c11cb51686ebe22726db.tar.bz2
[3.13] gh-139283: correctly handle `size` limit in `cursor.fetchmany()` (GH-139296) (#139444)
Passing a negative or zero size to `cursor.fetchmany()` made it fetch all rows instead of none. While this could be considered a security vulnerability, it was decided to treat this issue as a regular bug as passing a non-sanitized *size* value in the first place is not recommended. (cherry picked from commit bc172ee8307431caf4c89612e9e454081635191f)
Diffstat (limited to 'Python/Python-tokenize.c')
0 files changed, 0 insertions, 0 deletions