This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author schmir
Recipients a_lauer, akuchling, bacchusrx, bob.ippolito, christian.heimes, martey, schmir, vila
Date 2008-04-14.21:07:38
SpamBayes Score 0.10998455
Marked as misclassified No
Message-id <>
Well, I think the right thing to do is limit the maximal size to be read
inside the c function (just to make it impossible to pass around large
values). This is basically the same fix just at another place in the code. describes the same problem
(but with 64 k read requests: it can even leak with small requests).
The fix there was to really copy those strings around into a StringIO

Note that the code does not read byte by byte when passing in no size
argument. Instead it read recv_size bytes:

            if self._rbufsize <= 1:
                recv_size = self.default_bufsize
                recv_size = self._rbufsize

This seems clearly wrong to me.
Date User Action Args
2008-04-14 21:07:39schmirsetspambayes_score: 0.109985 -> 0.10998455
recipients: + schmir, akuchling, bob.ippolito, bacchusrx, a_lauer, christian.heimes, vila, martey
2008-04-14 21:07:39schmirsetspambayes_score: 0.109985 -> 0.109985
messageid: <>
2008-04-14 21:07:38schmirlinkissue1092502 messages
2008-04-14 21:07:38schmircreate