This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author belopolsky
Recipients Arfrever, barry, belopolsky, ezio.melotti, jhalcrow, lemburg, loewis, pitrou, valhallasw, vstinner
Date 2010-12-17.05:45:39
SpamBayes Score 3.68577e-08
Marked as misclassified No
Message-id <1292564741.91.0.159683784811.issue10254@psf.upfronthosting.co.za>
In-reply-to
Content
Attached patch, issue10254.diff, is essentially Martin's code from msg120018 and Part3 tests from NormalizationTest.txt.

Since this bug exposes a buffer overflow condition, I think it qualifies as a security issue, so I am adding 2.6 to versions.

Passing Part3 tests and not crashing on crash.py is probably good enough for a commit, but I don't have a proof that length 20 skipped buffer is always enough.  As the next step, I would like to consider an alternative algorithm that would not require a "skipped" buffer.
History
Date User Action Args
2010-12-17 05:45:42belopolskysetrecipients: + belopolsky, lemburg, loewis, barry, pitrou, vstinner, ezio.melotti, Arfrever, jhalcrow, valhallasw
2010-12-17 05:45:41belopolskysetmessageid: <1292564741.91.0.159683784811.issue10254@psf.upfronthosting.co.za>
2010-12-17 05:45:39belopolskylinkissue10254 messages
2010-12-17 05:45:39belopolskycreate