On Wed, Dec 21, 2016 at 02:03:21PM +0000, Marius Bakke wrote: > mbakke pushed a commit to branch master > in repository guix. > > commit 42366b35c3f9f8dc8b059d3369b8196a4b832c18 > Author: Marius Bakke <mba...@fastmail.com> > Date: Wed Dec 21 14:56:34 2016 +0100 > > gnu: curl: Update replacement to 7.52.0 [fixes CVE-2016-{9586,9952,9953}]. > > * gnu/packages/curl.scm (curl)[replacement]: Update to 7.52.0. > (curl-7.51.0): Replace with ... > (curl-7.52.0): ... this.
ng0 pointed out this message from the curl maintainers: "Attention! We will release a patch update within a few days to fix a serious security problem found in curl 7.52.0. You may consider holding off until then." https://curl.haxx.se/download.html So, I reverted the update for now. It seems like this new bug is more serious than the security bug fixed in 7.52.0, CVE-2016-9586: printf floating point buffer overflow. The other two named bugs fixed in 7.52.0 only manifest on Windows CE with the schannel TLS implementation, if I understand correctly.