[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: 01/01: gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586
From: |
Leo Famulari |
Subject: |
Re: 01/01: gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586, 9952, 9953}]. |
Date: |
Wed, 21 Dec 2016 11:58:44 -0500 |
User-agent: |
Mutt/1.7.1 (2016-10-04) |
On Wed, Dec 21, 2016 at 02:03:21PM +0000, Marius Bakke wrote:
> mbakke pushed a commit to branch master
> in repository guix.
>
> commit 42366b35c3f9f8dc8b059d3369b8196a4b832c18
> Author: Marius Bakke <address@hidden>
> Date: Wed Dec 21 14:56:34 2016 +0100
>
> gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586,9952,9953}].
>
> * gnu/packages/curl.scm (curl)[replacement]: Update to 7.52.0.
> (curl-7.51.0): Replace with ...
> (curl-7.52.0): ... this.
ng0 pointed out this message from the curl maintainers:
"Attention! We will release a patch update within a few days to fix a
serious security problem found in curl 7.52.0. You may consider holding
off until then."
https://curl.haxx.se/download.html
So, I reverted the update for now. It seems like this new bug is more
serious than the security bug fixed in 7.52.0, CVE-2016-9586: printf
floating point buffer overflow. The other two named bugs fixed in 7.52.0
only manifest on Windows CE with the schannel TLS implementation, if I
understand correctly.
- Re: 01/01: gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586, 9952, 9953}].,
Leo Famulari <=