You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are a few other instances of this exact construct as well as a large number of as invocations on integer types that are not very safe or idiomatic. That doesn't necessarily mean it is even possible to trigger other issues like this one, but it does mean there could be a little more defensive coding here.
I did a quick pass looking for other potential instances of similar overflows and see a few potential cases. I did not review the larger context to figure out whether the potential overflow is a reachable code path, only the local context of the integer handling.
Unfortunately in playing with "fixing" these it became obvious the cases are not all covered by existing test. For example one can delete this line of code entirely and the test suite still just passes:
Originally posted by @alerque in #142 (comment)
I did a quick pass looking for other potential instances of similar overflows and see a few potential cases. I did not review the larger context to figure out whether the potential overflow is a reachable code path, only the local context of the integer handling.
Unfortunately in playing with "fixing" these it became obvious the cases are not all covered by existing test. For example one can delete this line of code entirely and the test suite still just passes:
rustybuzz/src/hb/ot_layout_gsubgpos.rs
Line 941 in 7386be4
The text was updated successfully, but these errors were encountered: