From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andreas Enge Subject: Re: [PATCH 0/1] Curl security update (CVE-2016-0755) Date: Wed, 27 Jan 2016 21:03:45 +0100 Message-ID: <20160127200345.GA3999@debian> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:56783) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1aOWJp-0005rw-5b for guix-devel@gnu.org; Wed, 27 Jan 2016 15:03:57 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1aOWJk-0007Ra-3n for guix-devel@gnu.org; Wed, 27 Jan 2016 15:03:57 -0500 Received: from mailrelay6.public.one.com ([91.198.169.200]:60175) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1aOWJj-0007RP-PA for guix-devel@gnu.org; Wed, 27 Jan 2016 15:03:52 -0500 Content-Disposition: inline In-Reply-To: List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org To: Leo Famulari Cc: guix-devel@gnu.org On Wed, Jan 27, 2016 at 01:57:22PM -0500, Leo Famulari wrote: > This patch updates curl to 7.47.0, fixing CVE-2016-0755 [0][1]. Ouch! guix refresh -l curl Building the following 318 packages would ensure 772 dependent packages are rebuilt This is about a quarter of all packages. > Feel free to apply the patch where appropriate. I would suggest the following: Quickly merge core-updates once the packages on x86_64 are built (there are not many left, and qt-5 did build successfully sequentially, so this could be done tomorrow), then create a new security-updates branch with the patch for curl. What do you think? Andreas