sapling/mercurial/cext
Yuya Nishihara 9b22314380 encoding: check overflow while calculating size of JSON escape buffer
The minimum input size to exploit is ~682MB (= INT_MAX / len('\\u0000') * 2)
on 32bit system, which isn't easy to achieve using Python str in 2GB process
address space, but probably doable.
2017-08-31 21:56:40 +09:00
..
__init__.py policy: add "cext" package which will host CPython extension modules 2016-08-12 11:06:14 +09:00
base85.c base85: switch to policy importer 2016-08-13 12:08:23 +09:00
bdiff.c bdiff: switch to policy importer 2016-08-13 12:12:50 +09:00
charencode.c encoding: check overflow while calculating size of JSON escape buffer 2017-08-31 21:56:40 +09:00
charencode.h encoding: add fast path of jsonescape() (issue5533) 2017-04-23 14:47:52 +09:00
diffhelpers.c diffhelpers: switch to policy importer 2016-08-13 12:15:49 +09:00
dirs.c parsers: switch to policy importer 2016-08-13 12:23:56 +09:00
manifest.c cext: split character encoding functions to new compilation unit 2017-07-31 22:28:27 +09:00
mpatch.c mpatch: switch to policy importer 2016-08-13 12:18:58 +09:00
osutil.c osutil: switch to policy importer 2016-08-12 11:35:17 +09:00
parsers.c encoding: add fast path of jsonescape() (issue5533) 2017-04-23 14:47:52 +09:00
pathencode.c parsers: switch to policy importer 2016-08-13 12:23:56 +09:00
revlog.c parsers: fix invariant bug in find_deepest (issue5623) 2017-07-14 13:48:17 +02:00
util.h cext: move _dict_new_presized() to header 2017-07-31 22:12:24 +09:00