FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Please give me your LTO-4 or better tape library and I'll put it to good use.
found something from the cache
non port: head/lang/python33/files/patch-CVE-2014-1912
SVNWeb

Number of commits found: 2

Tue, 4 Mar 2014
[ 12:38 koobs ] Original commit 
347015 Mk/bsd.python.mk
347015 lang/python-doc-html/distinfo
347015 lang/python33/Makefile
347015 lang/python33/distinfo
347015 lang/python33/files/patch-CVE-2014-1912
347015 lang/python33/files/patch-Modules-fcntlmodule.c
347015 lang/python33/files/patch-Modules__fcntlmodule.c
347015 lang/python33/files/patch-issue-20695-Lib__test__test_urllibnet.py
347015 lang/python33/files/patch-issue20374
347015 lang/python33/pkg-plist
lang/python33: Update to 3.3.4

- Update to 3.3.4
- Update pkg-plist
- Remove patch-CVE-2014-1912 (upstream)
- Remove patch-issue20374 (upstream)
- Repatch and rename patch-Modules__fcntlmodule.c
- Add patch-issue-20695-Lib__test__test_urllibnet.py (tests) [1]
- Add regression-test target for QA

Changes: 3.3.4 - 09/02/2014

    http://docs.python.org/3.3/whatsnew/changelog.html#python-3-3-4

Extra:

- Update python-doc-html distinfo for Python 3.3 docs
- Update bsd.python.mk to support the new version

[1] http://bugs.python.org/issue20695
Sat, 1 Mar 2014
[ 10:52 koobs ] Original commit 
346614 lang/python27/Makefile
346614 lang/python27/files/patch-CVE-2014-1912
346614 lang/python31/Makefile
346614 lang/python31/files/patch-CVE-2014-1912
346614 lang/python32/Makefile
346614 lang/python32/files/patch-CVE-2014-1912
346614 lang/python33/Makefile
346614 lang/python33/files/patch-CVE-2014-1912
lang/python*: Backport security fix for CVE-2014-1912

A vulnerability was reported [1] in Python's socket module, due to a
boundary error within the sock_recvfrom_into() function, which could be
exploited to cause a buffer overflow.

This could be used to crash a Python application that uses the
socket.recvfrom_info() function or, possibly, execute arbitrary code
with the permissions of the user running vulnerable Python code.

This vulnerable function, socket.recvfrom_into(), was introduced in
Python 2.5. Earlier versions are not affected by this flaw.  This is
fixed in upstream branches for version 2.7, 3.1, 3.2 and 3.3.

[1] http://bugs.python.org/issue20246

MFH:		2014Q1
Security:	8e5e6d42-a0fa-11e3-b09a-080027f2d077

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
ffmpegJun 02
ffmpeg0Jun 02
avidemux2Jun 01
hostapdJun 01
kodi*Jun 01
rawstudio*Jun 01
ufraw*Jun 01
wpa_supplicantJun 01
cabextractMay 31
cabextractMay 31
libmspackMay 31
py-djangoMay 31
py-django-develMay 31
rubygem-rest-clientMay 31
rubygem-rest-clientMay 31

28 vulnerabilities affecting 50 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24854
Broken 230
Deprecated 69
Ignore 498
Forbidden 1
Restricted 204
No CDROM 95
Vulnerable 23
Expired 26
Set to expire 58
Interactive 0
new 24 hours 6
new 48 hours16
new 7 days47
new fortnight79
new month179

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.