Senthil Kumaran <sent...@uthcode.com> added the comment: pass_to_cython(urlparse("http://google.de:999999**999999[to be calculated]").port)
is no different than sending pass_to_cython(999999**999999[to be calculated]) In that case, would the former make a security loop hole in urlparse? Looks pretty contrived to me as an example for .port bug. However, I agree with one point in your assertion, namely that port be checked that it is within the range integer >= 1 and <= 65535. If it is not, return None as a response in port. ---------- _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue14036> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com