Date: Tue, 06 Feb 2018 18:36:15 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 225706] www/uwsgi: Fix potential stack overflow in uwsgi_expand_path() Message-ID: <bug-225706-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D225706 Bug ID: 225706 Summary: www/uwsgi: Fix potential stack overflow in uwsgi_expand_path() Product: Ports & Packages Version: Latest Hardware: Any URL: https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97 a4eef7a3cdcbd85a71247bfe OS: Any Status: New Keywords: patch, security Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: vlad-fbsd@acheronmedia.com CC: eugene@zhegan.in, ports-secteam@FreeBSD.org Attachment #190363 maintainer-approval?(eugene@zhegan.in) Flags: CC: eugene@zhegan.in Flags: maintainer-feedback?(eugene@zhegan.in), merge-quarterly? Created attachment 190363 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D190363&action= =3Dedit Fix potential stack overflow in uwsgi_expand_path() A stack overflow situation has been found and fixed in uwsgi with the follo= wing commit: https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247= bfe Attached is the ported patch. Builds with Poudriere 11.1 amd64, run-time te= sted in production. New release of uwsgi (2.0.16) is pending any day now, which will probably include this, but I've filed this PR anyway for your consideration to inclu= de it earlier. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-225706-13>