Python 3.5 scan_eol() Buffer Over-Read...

- AV AC AU C I A
发布: 2015-10-30
修订: 2025-04-13

Python 3.5 suffers from a vulnerability caused by the behavior of the scan_eol() function. When called, the function gets a line from the buffer of a BytesIO object by searching for a newline character starting at the position in the buffer. However, if the position is set to a value that is larger than the buffer, this logic will result in a call to memchr that reads off the end of the buffer.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息