From mboxrd@z Thu Jan 1 00:00:00 1970 From: Leo Famulari Subject: Re: 01/01: gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586, 9952, 9953}]. Date: Wed, 21 Dec 2016 11:58:44 -0500 Message-ID: <20161221165844.GA7240@jasmine> References: <20161221140321.28790.1100@vcs.savannah.gnu.org> <20161221140321.922BB220166@vcs.savannah.gnu.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:56963) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cJkE5-0005SJ-Tc for guix-devel@gnu.org; Wed, 21 Dec 2016 11:58:50 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cJkE2-0004R0-SM for guix-devel@gnu.org; Wed, 21 Dec 2016 11:58:49 -0500 Received: from out3-smtp.messagingengine.com ([66.111.4.27]:46385) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1cJkE2-0004Qp-Nb for guix-devel@gnu.org; Wed, 21 Dec 2016 11:58:46 -0500 Received: from localhost (c-73-188-17-148.hsd1.pa.comcast.net [73.188.17.148]) by mail.messagingengine.com (Postfix) with ESMTPA id 615352442C for ; Wed, 21 Dec 2016 11:58:45 -0500 (EST) Content-Disposition: inline In-Reply-To: <20161221140321.922BB220166@vcs.savannah.gnu.org> List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: guix-devel@gnu.org On Wed, Dec 21, 2016 at 02:03:21PM +0000, Marius Bakke wrote: > mbakke pushed a commit to branch master > in repository guix. > > commit 42366b35c3f9f8dc8b059d3369b8196a4b832c18 > Author: Marius Bakke > Date: Wed Dec 21 14:56:34 2016 +0100 > > gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586,9952,9953}]. > > * gnu/packages/curl.scm (curl)[replacement]: Update to 7.52.0. > (curl-7.51.0): Replace with ... > (curl-7.52.0): ... this. ng0 pointed out this message from the curl maintainers: "Attention! We will release a patch update within a few days to fix a serious security problem found in curl 7.52.0. You may consider holding off until then." https://curl.haxx.se/download.html So, I reverted the update for now. It seems like this new bug is more serious than the security bug fixed in 7.52.0, CVE-2016-9586: printf floating point buffer overflow. The other two named bugs fixed in 7.52.0 only manifest on Windows CE with the schannel TLS implementation, if I understand correctly.