From 56cb465cc93dcb35aaf7266ca3dbe2dcff1fac5f Mon Sep 17 00:00:00 2001 From: Serhiy Storchaka Date: Fri, 20 Oct 2017 17:08:15 +0300 Subject: bpo-31825: Fixed OverflowError in the 'unicode-escape' codec (#4058) and in codecs.escape_decode() when decode an escaped non-ascii byte. --- Objects/bytesobject.c | 2 +- Objects/unicodeobject.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'Objects') diff --git a/Objects/bytesobject.c b/Objects/bytesobject.c index 6a4eb67808..48b6501f7a 100644 --- a/Objects/bytesobject.c +++ b/Objects/bytesobject.c @@ -1257,7 +1257,7 @@ PyObject *PyBytes_DecodeEscape(const char *s, if (first_invalid_escape != NULL) { if (PyErr_WarnFormat(PyExc_DeprecationWarning, 1, "invalid escape sequence '\\%c'", - *first_invalid_escape) < 0) { + (unsigned char)*first_invalid_escape) < 0) { Py_DECREF(result); return NULL; } diff --git a/Objects/unicodeobject.c b/Objects/unicodeobject.c index bb1c0830fc..2f308774d7 100644 --- a/Objects/unicodeobject.c +++ b/Objects/unicodeobject.c @@ -6136,7 +6136,7 @@ PyUnicode_DecodeUnicodeEscape(const char *s, if (first_invalid_escape != NULL) { if (PyErr_WarnFormat(PyExc_DeprecationWarning, 1, "invalid escape sequence '\\%c'", - *first_invalid_escape) < 0) { + (unsigned char)*first_invalid_escape) < 0) { Py_DECREF(result); return NULL; } -- cgit v1.2.1