notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
non port: lang/python27/files/patch-CVE-2014-1912
SVNWeb

Number of commits found: 2

Mon, 14 Jul 2014
[ 07:20 koobs ] Original commit   Revision:361735
361735 Mk/bsd.python.mk
361735 lang/python27/Makefile
361735 lang/python27/distinfo
361735 lang/python27/files/patch-CVE-2014-1912
361735 lang/python27/files/patch-Doc-library-fcntl.rst
361735 lang/python27/files/patch-Doc__library__fcntl.rst
361735 lang/python27/files/patch-Modules-fcntlmodule.c
361735 lang/python27/files/patch-Modules__fcntlmodule.c
361735 lang/python27/files/patch-issue20374
361735 lang/python27/files/patch-setup.py

(Only the first 10 of 13 ports in this commit are shown above. View all ports for this commit)
lang/python27: Update to 2.7.8

The FreeBSD Python team welcomes Python 2.7.8 to the Ports tree!

Announcement: https://www.python.org/download/releases/2.7.8/
Changelog:    http://hg.python.org/cpython/raw-file/v2.7.8/Misc/NEWS

- Update to 2.7.8, update pkg-plist
- OPTIONS: Reorder and sort alphabetically
- OPTIONS: Make POSIX SEM(aphores) a DEFAULT (Hi binary package users!)
- OPTIONS: Add better descriptions for UCS2 and UCS4
- OPTIONS: Use options helpers
- Remove patch-CVE-2014-1912: upstream, was backported
- Remove patch-issue20374: upstream, was backported
- Rename patch-Doc__library__fcntl.rst: underscore convention
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 1 Mar 2014
[ 10:52 koobs ] Original commit   Revision:346614
346614 lang/python27/Makefile
346614 lang/python27/files/patch-CVE-2014-1912
346614 lang/python31/Makefile
346614 lang/python31/files/patch-CVE-2014-1912
346614 lang/python32/Makefile
346614 lang/python32/files/patch-CVE-2014-1912
346614 lang/python33/Makefile
346614 lang/python33/files/patch-CVE-2014-1912
lang/python*: Backport security fix for CVE-2014-1912

A vulnerability was reported [1] in Python's socket module, due to a
boundary error within the sock_recvfrom_into() function, which could be
exploited to cause a buffer overflow.

This could be used to crash a Python application that uses the
socket.recvfrom_info() function or, possibly, execute arbitrary code
with the permissions of the user running vulnerable Python code.

This vulnerable function, socket.recvfrom_into(), was introduced in
Python 2.5. Earlier versions are not affected by this flaw.  This is
fixed in upstream branches for version 2.7, 3.1, 3.2 and 3.3.

[1] http://bugs.python.org/issue20246

MFH:		2014Q1
Security:	8e5e6d42-a0fa-11e3-b09a-080027f2d077

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
drm-current-kmod*Dec 04
drm-devel-kmod*Dec 04
drm-fbsd11.2-kmod*Dec 04
drm-fbsd12.0-kmod*Dec 04
py-django21Dec 03
py-django22Dec 03
gitlab-ceNov 28
py-matrix-synapseNov 28
gitlab-ceNov 27
webkit2-gtk3Nov 27
py-urllib3Nov 26
clamavNov 25
unboundNov 23
asterisk13Nov 22
asterisk13Nov 22

13 vulnerabilities affecting 78 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2019-12-04 20:33:18


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38184
Broken 744
Deprecated 108
Ignore 1013
Forbidden 3
Restricted 155
No CDROM 72
Vulnerable 26
Expired 6
Set to expire 77
Interactive 0
new 24 hours 4
new 48 hours5
new 7 days29
new fortnight62
new month127

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2019 Dan Langille. All rights reserved.