Alexander Belopolsky <belopol...@users.sourceforge.net> added the comment:

Attached patch, issue10254.diff, is essentially Martin's code from msg120018 
and Part3 tests from NormalizationTest.txt.

Since this bug exposes a buffer overflow condition, I think it qualifies as a 
security issue, so I am adding 2.6 to versions.

Passing Part3 tests and not crashing on crash.py is probably good enough for a 
commit, but I don't have a proof that length 20 skipped buffer is always 
enough.  As the next step, I would like to consider an alternative algorithm 
that would not require a "skipped" buffer.

----------
keywords: +patch
stage:  -> commit review
versions: +Python 2.6
Added file: http://bugs.python.org/file20089/issue10254.diff

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue10254>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to