https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210539
Bug ID: 210539 Summary: lang/python33: HTTP Header Injection in Python urllib (CVE-2016-5699) Product: Ports & Packages Version: Latest Hardware: Any URL: http://blog.blindspotsecurity.com/2016/06/advisory-htt p-header-injection-in.html OS: Any Status: New Keywords: needs-patch, security Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: pyt...@freebsd.org Reporter: vlad-f...@acheronmedia.com CC: junovi...@freebsd.org, ports-sect...@freebsd.org Flags: maintainer-feedback?(pyt...@freebsd.org) Assignee: pyt...@freebsd.org Python 3.3 is vulnerable to HTTP Header injection in urllib. * Nice summary of the problem with POC: http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html * CVE request: http://www.openwall.com/lists/oss-security/2016/06/14/7 (assignment) http://www.openwall.com/lists/oss-security/2016/06/16/2 * Upstream issue: https://bugs.python.org/issue22928 * Upstream fix in Python 3.5, 3.4, 2.7 (but not 3.3): (3.5, 3.4) https://hg.python.org/cpython/rev/bf3e1c9b80e9 (2.7) https://hg.python.org/cpython/rev/1c45047c5102 I've tested the POC given in the first link above, and indeed injection happens with 3.3, but not with 3.4 (haven't tested the others). I'll see if I can backport the patch myself, will attach it here. Also waiting for upstream to respond about my backport request. -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ freebsd-python@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-python To unsubscribe, send any mail to "freebsd-python-unsubscr...@freebsd.org"