Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Jun 2016 16:16:10 +0000
From:      bugzilla-noreply@freebsd.org
To:        python@FreeBSD.org
Subject:   maintainer-feedback requested: [Bug 210324] lang/python35, lang/python34, lang/python27: Possible integer overflow and heap corruption in zipimporter (CVE-2016-5636)
Message-ID:  <bug-210324-21822-O4RyP2bgpk@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-210324-21822@https.bugs.freebsd.org/bugzilla/>
References:  <bug-210324-21822@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
Vladimir Krstulja <vlad-fbsd@acheronmedia.com> has reassigned Bugzilla
Automation <bugzilla@FreeBSD.org>'s request for maintainer-feedback to Free=
BSD
Python <python@FreeBSD.org>:
Bug 210324: lang/python35, lang/python34, lang/python27: Possible integer
overflow and heap corruption in zipimporter (CVE-2016-5636)
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210324



--- Description ---
Created attachment 171488
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D171488&action=
=3Dedit
VuXML entry for Pythons' vuln CVE-2016-5636

Looks like Python 3.5, 3.4 and 2.7 are vulnerable to CVE-2016-5636.

* Upstream issue: http://bugs.python.org/issue26171
* CVE assignment: http://openwall.com/lists/oss-security/2016/06/16/1

Attached is a vuxml entry patch. Please check it, this is my first vuxml
submission.

I also have not checked the status/vulnerability of python32 and python33, =
I am
listing the hereby given three versions since that's what the upstream repo=
rted
and patched.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210324-21822-O4RyP2bgpk>