STINNER Victor added the comment:

The bug was first reported to the private Python security mailing list. The 
PSRT decided that it's a regular bug and doesn't need to be categorized as a 
vulnerability, since the attacker has to be able to run arbitrary code in 
practice.

The PSRT considers that no Python 2.7 application currently rely on reading 
from the same file object "at the same time" from different thread, since it 
currently crashs.

So an attacker would have to run his/her own code... but if an attacker can 
already run arbitrary code, why relying on an unstable race condition and 
inject machine code (so not portable), whereas Python standard library is full 
of nice features to write your portable exploit?

For more information, see the Python security model:
https://python-security.readthedocs.io/security.html#security-model

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue31530>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to