Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bpo-45228: Fix stack buffer overflow in parsing J1939 address #28404

Conversation

@serhiy-storchaka
Copy link
Member

@serhiy-storchaka serhiy-storchaka commented Sep 17, 2021

https://bugs.python.org/issue45228

@miss-islington
Copy link
Contributor

@miss-islington miss-islington commented Sep 17, 2021

Thanks @serhiy-storchaka for the PR 🌮🎉.. I'm working now to backport this PR to: 3.9, 3.10.
🐍🍒🤖

@serhiy-storchaka serhiy-storchaka deleted the socket-addr-j1939-stack-buffer-overflow branch Sep 17, 2021
@bedevere-bot
Copy link

@bedevere-bot bedevere-bot commented Sep 17, 2021

GH-28406 is a backport of this pull request to the 3.10 branch.

@bedevere-bot
Copy link

@bedevere-bot bedevere-bot commented Sep 17, 2021

GH-28407 is a backport of this pull request to the 3.9 branch.

miss-islington added a commit to miss-islington/cpython that referenced this issue Sep 17, 2021
…GH-28404)

(cherry picked from commit 7733195)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
miss-islington added a commit to miss-islington/cpython that referenced this issue Sep 17, 2021
…GH-28404)

(cherry picked from commit 7733195)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
miss-islington added a commit that referenced this issue Sep 17, 2021
(cherry picked from commit 7733195)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
miss-islington added a commit that referenced this issue Sep 17, 2021
(cherry picked from commit 7733195)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
4 participants