File: skip-test-integer-overflow

package info (click to toggle)
rust-sqlx 0.8.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,744 kB
  • sloc: sql: 335; python: 268; sh: 71; makefile: 2
file content (12 lines) | stat: -rw-r--r-- 586 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
Index: rust-sqlx-0.8.2/tests/sqlite/rustsec.rs
===================================================================
--- rust-sqlx-0.8.2.orig/tests/sqlite/rustsec.rs
+++ rust-sqlx-0.8.2/tests/sqlite/rustsec.rs
@@ -5,6 +5,7 @@ use sqlx::{Connection, Error, SqliteConn
 // Similar theory to the Postgres exploit in `tests/postgres/rustsec.rs` but much simpler
 // since we just want to overflow the query length itself.
 #[sqlx::test]
+#[cfg(not(target_pointer_width = "32"))]
 async fn rustsec_2024_0363() -> anyhow::Result<()> {
     let overflow_len = 4 * 1024 * 1024 * 1024; // 4 GiB