Date: Thu, 16 Jun 2016 16:16:10 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 210324] lang/python35, lang/python34, lang/python27: Possible integer overflow and heap corruption in zipimporter (CVE-2016-5636) Message-ID: <bug-210324-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210324 Bug ID: 210324 Summary: lang/python35, lang/python34, lang/python27: Possible integer overflow and heap corruption in zipimporter (CVE-2016-5636) Product: Ports & Packages Version: Latest Hardware: Any URL: http://bugs.python.org/issue26171 OS: Any Status: New Keywords: needs-qa, patch, security Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: python@FreeBSD.org Reporter: vlad-fbsd@acheronmedia.com CC: junovitch@freebsd.org, ports-secteam@FreeBSD.org, python@FreeBSD.org CC: python@FreeBSD.org Assignee: python@FreeBSD.org Flags: maintainer-feedback?(python@FreeBSD.org), maintainer-feedback?(python@FreeBSD.org) Created attachment 171488 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D171488&action= =3Dedit VuXML entry for Pythons' vuln CVE-2016-5636 Looks like Python 3.5, 3.4 and 2.7 are vulnerable to CVE-2016-5636. * Upstream issue: http://bugs.python.org/issue26171 * CVE assignment: http://openwall.com/lists/oss-security/2016/06/16/1 Attached is a vuxml entry patch. Please check it, this is my first vuxml submission. I also have not checked the status/vulnerability of python32 and python33, = I am listing the hereby given three versions since that's what the upstream repo= rted and patched. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210324-13>