unofficial mirror of guix-devel@gnu.org 
 help / color / mirror / code / Atom feed
From: Marius Bakke <mbakke@fastmail.com>
To: ng0 <ng0@libertad.pw>, guix-devel@gnu.org
Subject: Re: 01/01: gnu: curl: Update replacement to	7.52.0	[fixes	CVE-2016-{9586, 9952, 9953}].
Date: Fri, 23 Dec 2016 15:31:56 +0100	[thread overview]
Message-ID: <87inqaaf8j.fsf@kirby.i-did-not-set--mail-host-address--so-tickle-me> (raw)
In-Reply-To: <87h95vrou3.fsf@wasp.i-did-not-set--mail-host-address--so-tickle-me>

[-- Attachment #1: Type: text/plain, Size: 1783 bytes --]

ng0 <ng0@libertad.pw> writes:

> Marius Bakke <mbakke@fastmail.com> writes:
>
>> Leo Famulari <leo@famulari.name> writes:
>>
>>> On Wed, Dec 21, 2016 at 02:03:21PM +0000, Marius Bakke wrote:
>>>> mbakke pushed a commit to branch master
>>>> in repository guix.
>>>> 
>>>> commit 42366b35c3f9f8dc8b059d3369b8196a4b832c18
>>>> Author: Marius Bakke <mbakke@fastmail.com>
>>>> Date:   Wed Dec 21 14:56:34 2016 +0100
>>>> 
>>>>     gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586,9952,9953}].
>>>>     
>>>>     * gnu/packages/curl.scm (curl)[replacement]: Update to 7.52.0.
>>>>     (curl-7.51.0): Replace with ...
>>>>     (curl-7.52.0): ... this.
>>>
>>> ng0 pointed out this message from the curl maintainers:
>>>
>>> "Attention! We will release a patch update within a few days to fix a
>>> serious security problem found in curl 7.52.0. You may consider holding
>>> off until then."
>>>
>>> https://curl.haxx.se/download.html
>>
>> Thanks for catching that! I think that message must have appeared after
>> I downloaded it from there, difficult to miss that notice.
>>
>> The page was updated about 25 minutes after the commit was pushed:
>> $ curl -v https://curl.haxx.se/download.html >/dev/null
>> [...]
>> < Last-Modified: Wed, 21 Dec 2016 14:28:41 GMT
>>
>> It was reverted around 16:52 UTC. I hope those who upgraded in between
>> those five hours reads this list!
>
> Today cURL 7.52.1 has been released, addressing the issue which
> was present only in 7.52.0: https://curl.haxx.se/docs/adv_20161223.html

Thanks for the heads-up, I've pushed the update.

I added the CVE identifier for the 7.52.0 bug in the commit log since we
had it for a short while, and removed the WinCE specific identifiers
(thanks Leo!).

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

      reply	other threads:[~2016-12-23 14:32 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20161221140321.28790.1100@vcs.savannah.gnu.org>
     [not found] ` <20161221140321.922BB220166@vcs.savannah.gnu.org>
2016-12-21 16:58   ` 01/01: gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586, 9952, 9953}] Leo Famulari
2016-12-21 19:27     ` Marius Bakke
2016-12-23  9:12       ` ng0
2016-12-23 14:31         ` Marius Bakke [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87inqaaf8j.fsf@kirby.i-did-not-set--mail-host-address--so-tickle-me \
    --to=mbakke@fastmail.com \
    --cc=guix-devel@gnu.org \
    --cc=ng0@libertad.pw \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).