Created attachment 165313 [details] Proposed patch The attached patch fixes a shell injection vulnerability that I've already documented in vuln.xml. More information here: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8557
ping ports-secteam?
(In reply to Raphael Kubo da Costa from comment #1) Bump. This vulnerability has been around for more than a week now.
Already added to VuXML: http://www.vuxml.org/freebsd/5f276780-b6ce-11e5-9731-5453ed2e2b49.html
Please go with this patch. Approved with my ports-secteam hat.
A commit references this bug: Author: rakuco Date: Sun Jan 17 12:03:37 UTC 2016 New revision: 406304 URL: https://svnweb.freebsd.org/changeset/ports/406304 Log: Add upstream patch to fix CVE-2015-8557. PR: 206072 Approved by: ports-secteam (miwi) Security: 5f276780-b6ce-11e5-9731-5453ed2e2b49 Changes: head/textproc/py-pygments/Makefile head/textproc/py-pygments/files/ head/textproc/py-pygments/files/patch-CVE-2015-8557
A commit references this bug: Author: rakuco Date: Sun Jan 17 12:04:48 UTC 2016 New revision: 406305 URL: https://svnweb.freebsd.org/changeset/ports/406305 Log: MFH: r406304 Add upstream patch to fix CVE-2015-8557. PR: 206072 Approved by: ports-secteam (miwi) Security: 5f276780-b6ce-11e5-9731-5453ed2e2b49 Approved by: portmgr blanket approval Changes: _U branches/2016Q1/ branches/2016Q1/textproc/py-pygments/Makefile branches/2016Q1/textproc/py-pygments/files/