diff options
| author | Guido van Rossum <guido@python.org> | 1997-12-10 22:59:55 (GMT) |
|---|---|---|
| committer | Guido van Rossum <guido@python.org> | 1997-12-10 22:59:55 (GMT) |
| commit | d0753e20b256057a6320e95e43974f053f4123f1 (patch) | |
| tree | 16b8823424a3726cbcd52b7f68f47318599c2631 /Modules/getpath.c | |
| parent | 90d62ab0a175b8f3451ee74f29d5de83650e2292 (diff) | |
| download | cpython-d0753e20b256057a6320e95e43974f053f4123f1.zip cpython-d0753e20b256057a6320e95e43974f053f4123f1.tar.gz cpython-d0753e20b256057a6320e95e43974f053f4123f1.tar.bz2 | |
At Barry's suggestion, plug the security leak by using an empty
__builtins__ for all calls to eval(). This still allows someone to
write string.atof("[1]*1000000") (which Jim Fulton worries about) but
effectively disables access to system modules and functions.
Diffstat (limited to 'Modules/getpath.c')
0 files changed, 0 insertions, 0 deletions
