Skip to content

Commit 07ea52a

Browse files
committed
update-news
1 parent 295bba5 commit 07ea52a

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed
Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
The underlying extension modules behind :mod:`readline`:, :mod:`subprocess`,
22
and :mod:`ctypes` now raise audit events on previously uncovered code paths
33
that could lead to file system access related to C function calling and
4-
external binary execution.
4+
external binary execution. The ``ctypes.call_function`` audit hook has also
5+
been fixed to use an unsigned value for its ``function pointer``.

0 commit comments

Comments
 (0)