[Python-Dev] [SECUNIA] "buffer overrun in repr() for unicode strings" Potential Vulnerability (fwd)

skip at pobox.com skip at pobox.com
Wed Sep 27 17:28:46 CEST 2006


This came in to the webmaster address and was also addressed to a number of
individuals (looks like the SF project admins).  This appears like it would
be of general interest to this group.

Looking through this message and the various bug tracker items it's not
clear to me if Secunia wants to know if the patch (which I believe has
already been applied to all three active svn branches) is the source of the
problem or if they want to know if it solves the buffer overrun problem.
Are they suggesting that 10*size should be the character multiple in all
cases?

Skip

-------------- next part --------------
An embedded message was scrubbed...
From: Secunia Research <vuln at secunia.com>
Subject: [SECUNIA] "buffer overrun in repr() for unicode strings" Potential
	Vulnerability
Date: Wed, 27 Sep 2006 15:18:46 +0200
Size: 5508
Url: http://mail.python.org/pipermail/python-dev/attachments/20060927/fdfd4bdf/attachment.mht 


More information about the Python-Dev mailing list