Ned Deily <n...@python.org> added the comment:

> my only goal was to help Python community (which I love it) to improve the 
> code quality

Thanks for trying to improve things, we do appreciate it!

The idea here is that to be able to exploit the crashing pyc file, you need to 
be able to run an arbitrary pyc file on the web service and to do that the 
attacker has to have access somehow to the interpreter. If the web service has 
a hole to allow that, many bad things are possible. That's true for many other 
languages and tools, too.  So it's just not worth worrying about being able to 
crash with a fuzzed pyc file since, if you can exploit that, you can exploit in 
much easier ways.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue41189>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to