Title: [3.8] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096) by miss-islington · Pull Request #104332 · python/cpython · GitHub
Open Graph Title: [3.8] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096) by miss-islington · Pull Request #104332 · python/cpython
X Title: [3.8] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096) by miss-islington · Pull Request #104332 · python/cpython
Description: Fix directory traversal security flaw in uu.decode() also check absolute paths and os.altsep Add a regression test. (cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll 70000253+samcarroll42@users.noreply.github.com Co-authored-by: Gregory P. Smith greg@krypto.org [Google] Issue: gh-99889
Open Graph Description: Fix directory traversal security flaw in uu.decode() also check absolute paths and os.altsep Add a regression test. (cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll 70000253+samcar...
X Description: Fix directory traversal security flaw in uu.decode() also check absolute paths and os.altsep Add a regression test. (cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll 70000253+samcar...
Opengraph URL: https://github.com/python/cpython/pull/104332
X: @github
Domain: github.com
| route-pattern | /:user_id/:repository/pull/:id/checks(.:format) |
| route-controller | pull_requests |
| route-action | checks |
| fetch-nonce | v2:2e18623a-2c70-d011-d66b-fa612dcdefd3 |
| current-catalog-service-hash | 87dc3bc62d9b466312751bfd5f889726f4f1337bdff4e8be7da7c93d6c00a25a |
| request-id | B1B2:274FD0:1E3CE5:29F835:6969633C |
| html-safe-nonce | 887788412c19ae4bc6995920ded0ffb344ab5d60135a56a1a28650b9ba253828 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCMUIyOjI3NEZEMDoxRTNDRTU6MjlGODM1OjY5Njk2MzNDIiwidmlzaXRvcl9pZCI6IjY0OTQ5OTc4MzA1MjU2MDg3NjQiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ== |
| visitor-hmac | 60068fcaf4760966329d9074f7a47c5a643576151171f23c8d1bb02926540a5e |
| hovercard-subject-tag | pull_request:1344012823 |
| github-keyboard-shortcuts | repository,pull-request-list,pull-request-conversation,pull-request-files-changed,checks,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/python/cpython/pull/104332/checks |
| twitter:image | https://avatars.githubusercontent.com/u/31488909?s=400&v=4 |
| twitter:card | summary_large_image |
| og:image | https://avatars.githubusercontent.com/u/31488909?s=400&v=4 |
| og:image:alt | Fix directory traversal security flaw in uu.decode() also check absolute paths and os.altsep Add a regression test. (cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll 70000253+samcar... |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | 48487c1ad776a7975b7132d95f4240ff3ae37cd5b8e3cb597102a4edb76738f1 |
| turbo-cache-control | no-preview |
| go-import | github.com/python/cpython git https://github.com/python/cpython.git |
| octolytics-dimension-user_id | 1525981 |
| octolytics-dimension-user_login | python |
| octolytics-dimension-repository_id | 81598961 |
| octolytics-dimension-repository_nwo | python/cpython |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 81598961 |
| octolytics-dimension-repository_network_root_nwo | python/cpython |
| turbo-body-classes | logged-out env-production page-responsive full-width full-width-p-0 |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 669463fcc54773a88c1f5a44eef6b99a5504b9c7 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width