This came in to the webmaster address and was also addressed to a number of individuals (looks like the SF project admins). This appears like it would be of general interest to this group. Looking through this message and the various bug tracker items it's not clear to me if Secunia wants to know if the patch (which I believe has already been applied to all three active svn branches) is the source of the problem or if they want to know if it solves the buffer overrun problem. Are they suggesting that 10*size should be the character multiple in all cases? Skip -------------- next part -------------- An embedded message was scrubbed... From: Secunia Research <vuln at secunia.com> Subject: [SECUNIA] "buffer overrun in repr() for unicode strings" Potential Vulnerability Date: Wed, 27 Sep 2006 15:18:46 +0200 Size: 5508 Url: http://mail.python.org/pipermail/python-dev/attachments/20060927/fdfd4bdf/attachment.mht
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4