https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210325

            Bug ID: 210325
           Summary: lang/python35, lang/python34, lang/python27: Backport
                    patches for CVE-2016-5636
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: http://bugs.python.org/issue26171
                OS: Any
            Status: New
          Keywords: easy, patch, patch-ready, security
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: pyt...@freebsd.org
          Reporter: vlad-f...@acheronmedia.com
                CC: junovi...@freebsd.org, ports-sect...@freebsd.org,
                    pyt...@freebsd.org
 Attachment #171489 maintainer-approval?(pyt...@freebsd.org)
             Flags:
             Flags: maintainer-feedback?(pyt...@freebsd.org)
          Assignee: pyt...@freebsd.org
                CC: pyt...@freebsd.org

Created attachment 171489
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=171489&action=edit
Patch pythons against CVE-2016-5636

Backported patches for pythons, for CVE-2016-5636.

This includes Python 3.5, 3.4 and 2.7 and are upstream patches. I have not
tried to apply the fix to 3.3 and 3.2.

Poudriere 10.3-p5 amd64 builds fine.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
_______________________________________________
freebsd-python@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-python
To unsubscribe, send any mail to "freebsd-python-unsubscr...@freebsd.org"

Reply via email to