New submission from anatoly techtonik <techto...@gmail.com>: 2to3 converts raw_input() calls into input(), and input() runs all user data through eval(). This opens a hole in previously secure Python2.x applications.
Is the author of this change aware of the issue? ---------- components: 2to3 (2.x to 3.0 conversion tool) messages: 131805 nosy: techtonik priority: normal severity: normal status: open title: raw_input() -> input() security issue type: security versions: Python 3.2 _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue11641> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com