Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 12 Apr 2026 18:36:46 +0000
From:      Daniel Engberg <diizzy@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Cc:        Matthias Andree <mandree@FreeBSD.org>
Subject:   git: 8575855cbba0 - main - security/vuxml: Add entries for Python CVE-2026-1502 and gh-146333
Message-ID:  <69dbe63e.3af47.4aaaa24b@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by diizzy:

URL: https://cgit.FreeBSD.org/ports/commit/?id=8575855cbba0c7b933aaa7edd1825937b97efad8

commit 8575855cbba0c7b933aaa7edd1825937b97efad8
Author:     Matthias Andree <mandree@FreeBSD.org>
AuthorDate: 2026-04-12 18:17:06 +0000
Commit:     Daniel Engberg <diizzy@FreeBSD.org>
CommitDate: 2026-04-12 18:35:01 +0000

    security/vuxml: Add entries for Python CVE-2026-1502 and gh-146333
    
    PR:             294324
    Security:       CVE-2026-1502
                    / 30bda1c3-369b-11f1-b51c-6dd25bec137b
    
    Security:       5ec4dcf6-3588-11f1-b51c-6dd25bec137b
---
 security/vuxml/vuln/2026.xml | 53 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 53 insertions(+)

diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index 1bc2b6dde970..4597973c97f6 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,3 +1,56 @@
+  <vuln vid="30bda1c3-369b-11f1-b51c-6dd25bec137b">
+    <topic>Python -- HTTP proxy CONNECT tunnel does not sanitize CR/LF</topic>
+    <affects>
+      <package><name>python310</name><range><ge>0</ge></range></package>
+      <package><name>python311</name><range><ge>0</ge></range></package>
+      <package><name>python312</name><range><ge>0</ge></range></package>
+      <package><name>python313</name><range><ge>0</ge></range></package>
+      <package><name>python314</name><range><lt>3.14.4</lt></range></package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Seth Larson reports:</p>
+	<blockquote cite="https://github.com/python/cpython/issues/146211">;
+	  <p>HTTP proxy via "CONNECT" tunneling doesn't sanitize CR/LF (CVE-2026-1502).</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2026-1502</cvename>
+      <url>https://github.com/python/cpython/issues/146211</url>;
+    </references>
+    <dates>
+      <discovery>2026-03-20</discovery>
+      <entry>2026-04-12</entry>
+    </dates>
+   </vuln>
+
+  <vuln vid="5ec4dcf6-3588-11f1-b51c-6dd25bec137b">
+    <topic>Python -- configparser vulnerable to excessive CPU use</topic>
+    <affects>
+      <package><name>python310</name><range><ge>0</ge></range></package>
+      <package><name>python311</name><range><ge>0</ge></range></package>
+      <package><name>python312</name><range><ge>0</ge></range></package>
+      <package><name>python313</name><range><ge>0</ge></range></package>
+      <package><name>python314</name><range><lt>3.14.4</lt></range></package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Stan Ulbrych reports:</p>
+	<blockquote cite="https://github.com/python/cpython/issues/146333">;
+	  <p>configparser.RawConfigParser.{OPTCRE,OPTCRE_NV} regexes [are] vulnerable to quadratic backtracking.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <url>https://github.com/python/cpython/issues/146333</url>;
+    </references>
+    <dates>
+      <discovery>2026-03-23</discovery>
+      <entry>2026-04-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="8d549898-3598-11f1-a8bc-3c7c3fba4204">
     <topic>py-ormar -- vulnerabilities</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69dbe63e.3af47.4aaaa24b>