https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210324

            Bug ID: 210324
           Summary: lang/python35, lang/python34, lang/python27: Possible
                    integer overflow and heap corruption in zipimporter
                    (CVE-2016-5636)
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: http://bugs.python.org/issue26171
                OS: Any
            Status: New
          Keywords: needs-qa, patch, security
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: pyt...@freebsd.org
          Reporter: vlad-f...@acheronmedia.com
                CC: junovi...@freebsd.org, ports-sect...@freebsd.org,
                    pyt...@freebsd.org
                CC: pyt...@freebsd.org
          Assignee: pyt...@freebsd.org
             Flags: maintainer-feedback?(pyt...@freebsd.org),
                    maintainer-feedback?(pyt...@freebsd.org)

Created attachment 171488
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=171488&action=edit
VuXML entry for Pythons' vuln CVE-2016-5636

Looks like Python 3.5, 3.4 and 2.7 are vulnerable to CVE-2016-5636.

* Upstream issue: http://bugs.python.org/issue26171
* CVE assignment: http://openwall.com/lists/oss-security/2016/06/16/1

Attached is a vuxml entry patch. Please check it, this is my first vuxml
submission.

I also have not checked the status/vulnerability of python32 and python33, I am
listing the hereby given three versions since that's what the upstream reported
and patched.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
_______________________________________________
freebsd-python@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-python
To unsubscribe, send any mail to "freebsd-python-unsubscr...@freebsd.org"

Reply via email to