Date: Thu, 16 Jun 2016 16:23:39 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 210325] lang/python35, lang/python34, lang/python27: Backport patches for CVE-2016-5636 Message-ID: <bug-210325-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210325 Bug ID: 210325 Summary: lang/python35, lang/python34, lang/python27: Backport patches for CVE-2016-5636 Product: Ports & Packages Version: Latest Hardware: Any URL: http://bugs.python.org/issue26171 OS: Any Status: New Keywords: easy, patch, patch-ready, security Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: python@FreeBSD.org Reporter: vlad-fbsd@acheronmedia.com CC: junovitch@freebsd.org, ports-secteam@FreeBSD.org, python@FreeBSD.org Attachment #171489 maintainer-approval?(python@FreeBSD.org) Flags: Flags: maintainer-feedback?(python@FreeBSD.org) Assignee: python@FreeBSD.org CC: python@FreeBSD.org Created attachment 171489 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D171489&action= =3Dedit Patch pythons against CVE-2016-5636 Backported patches for pythons, for CVE-2016-5636. This includes Python 3.5, 3.4 and 2.7 and are upstream patches. I have not tried to apply the fix to 3.3 and 3.2. Poudriere 10.3-p5 amd64 builds fine. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210325-13>