Full title: Python 3.5 scan_eol() Buffer Over-Read Vulnerability Category: remote exploits Platform: python Python 3.5 suffers from a vulnerability caused by the behavior of the scan_eol() function. When called, the function gets a line from the buffer of a BytesIO object by searching for a newline character starting at the position in the buffer. However, if the position is set to a value that is larger than the buffer, this logic will result in a call to memchr that reads off the end of the buffer. # 0day.today @ http://0day.today/