Senthil Kumaran <sent...@uthcode.com> added the comment:

pass_to_cython(urlparse("http://google.de:999999**999999[to be 
calculated]").port)

is no different than sending

pass_to_cython(999999**999999[to be calculated])

In that case, would the former make a security loop hole in urlparse? Looks 
pretty contrived to me as an example for .port bug. 

However, I agree with one point in your assertion, namely that port be checked 
that it is within the range integer >= 1 and <= 65535. If it is not, return 
None as a response in port.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue14036>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to