Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 May 2020 15:43:48 +0000
From:      bugzilla-noreply@freebsd.org
To:        python@FreeBSD.org
Subject:   [Bug 246808] Update lang/python36 to 3.6.10
Message-ID:  <bug-246808-21822@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D246808

            Bug ID: 246808
           Summary: Update lang/python36 to 3.6.10
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: python@FreeBSD.org
          Reporter: mfisher911@gmail.com
             Flags: maintainer-feedback?(python@FreeBSD.org)
          Assignee: python@FreeBSD.org

Created attachment 214977
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D214977&action=
=3Dedit
lang/python36 update to 3.6.10 + CVE-2020-8492 patchset

Note: 246738 references 3.6.11 but this release has not been scheduled yet.=
 I
agree with Janos Mohacsi (#246738 author) that it would be nice to address =
the
security issue in lang/python36.

This patch updates lang/python36 to 3.6.10 and includes the accepted
CVE-2020-8492 patch set (https://github.com/python/cpython/pull/19304).

Here is the link to the Python bug tracker for CVE-2020-8492, which they tr=
ack
as "bpo-39503": https://bugs.python.org/issue39503.

According to the Python 3.6 changelog
(https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-10-final), =
the
"bpo-39503" is part of the unscheduled "Python next" release.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-246808-21822>