Date: Mon, 04 Jul 2016 01:46:50 +0000 From: bugzilla-noreply@freebsd.org To: python@FreeBSD.org Subject: [Bug 210539] lang/python33: HTTP Header Injection in Python urllib (CVE-2016-5699) Message-ID: <bug-210539-21822-I5R0euH04v@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-210539-21822@https.bugs.freebsd.org/bugzilla/> References: <bug-210539-21822@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210539 --- Comment #1 from commit-hook@freebsd.org --- A commit references this bug: Author: junovitch Date: Mon Jul 4 01:46:35 UTC 2016 New revision: 418007 URL: https://svnweb.freebsd.org/changeset/ports/418007 Log: Add fixed entries for Python 2.7, 3.4, 3.5 for urllib vulnerability. Reset 3.3 as unfixed. PR: 210539 PR: 210541 Reported by: Vladimir Krstulja <vlad-fbsd@acheronmedia.com> Security: CVE-2016-5699 Security:=20=20=20=20 https://vuxml.FreeBSD.org/freebsd/a61374fc-3a4d-11e6-a671-60a44ce6887b.html Changes: head/security/vuxml/vuln.xml --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210539-21822-I5R0euH04v>