https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210325
Bug ID: 210325 Summary: lang/python35, lang/python34, lang/python27: Backport patches for CVE-2016-5636 Product: Ports & Packages Version: Latest Hardware: Any URL: http://bugs.python.org/issue26171 OS: Any Status: New Keywords: easy, patch, patch-ready, security Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: pyt...@freebsd.org Reporter: vlad-f...@acheronmedia.com CC: junovi...@freebsd.org, ports-sect...@freebsd.org, pyt...@freebsd.org Attachment #171489 maintainer-approval?(pyt...@freebsd.org) Flags: Flags: maintainer-feedback?(pyt...@freebsd.org) Assignee: pyt...@freebsd.org CC: pyt...@freebsd.org Created attachment 171489 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=171489&action=edit Patch pythons against CVE-2016-5636 Backported patches for pythons, for CVE-2016-5636. This includes Python 3.5, 3.4 and 2.7 and are upstream patches. I have not tried to apply the fix to 3.3 and 3.2. Poudriere 10.3-p5 amd64 builds fine. -- You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug. _______________________________________________ freebsd-python@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-python To unsubscribe, send any mail to "freebsd-python-unsubscr...@freebsd.org"