Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Feb 2012 14:33:59 +0400
From:      Ruslan Mahmatkhanov <cvs-src@yandex.ru>
To:        wen heping <wenheping@gmail.com>
Cc:        Doug Barton <dougb@freebsd.org>, python@freebsd.org, FreeBSD ports list <freebsd-ports@freebsd.org>
Subject:   Re: Python upgrade to address vulnerability?
Message-ID:  <4F3B8A17.9090300@yandex.ru>
In-Reply-To: <CACi771-jFi5ZgEd4i-ojovy6veyWiaFY1-kKpJ1LSQ7LbO_u9w@mail.gmail.com>
References:  <4F3ADE3D.706@FreeBSD.org> <4F3B7AEC.5090905@yandex.ru> <CACi771-jFi5ZgEd4i-ojovy6veyWiaFY1-kKpJ1LSQ7LbO_u9w@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
wen heping wrote on 15.02.2012 14:16:
> 2012/2/15 Ruslan Mahmatkhanov<cvs-src@yandex.ru>
>
>> Doug Barton wrote on 15.02.2012 02:20:
>>
>>> So apparently we have a python vulnerability according to
>>> http://portaudit.FreeBSD.org/**b4f8be9e-56b2-11e1-9fb7-**
>>> 003067b2972c.html<http://portaudit.FreeBSD.org/b4f8be9e-56b2-11e1-9fb7-003067b2972c.html>;
>>> ,
>>> but I'm not seeing an upgrade to address it yet. Any idea when that will
>>> happen?
>>>
>>>
>>> Thanks,
>>>
>>> Doug
>>>
>>>
>> Patch is there:
>> http://people.freebsd.org/~rm/**python-CVE-2012-0845.diff.txt<http://people.freebsd.org/~rm/python-CVE-2012-0845.diff.txt>;
>
>
> Had this patch been committed into upstream? When I found it , it was in
> review state.
>
> And CVE-2012-0845 too.
>
> wen

Yes, it is not yet committed, but comments looks promisingly :). And i 
can't reproduce this bug after patching, using procedure described in 
bug report.

-- 
Regards,
Ruslan

Tinderboxing kills... the drives.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4F3B8A17.9090300>