Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#52247 - [curl] printf floating point buffer overflow security issue (CVE-2016-9586)
Attached to Project:
Arch Linux
Opened by Filip Frackiewicz (notreallyhere) - Friday, 23 December 2016, 00:05 GMT
Last edited by Levente Polyak (anthraxx) - Friday, 13 January 2017, 12:40 GMT
Opened by Filip Frackiewicz (notreallyhere) - Friday, 23 December 2016, 00:05 GMT
Last edited by Levente Polyak (anthraxx) - Friday, 13 January 2017, 12:40 GMT
|
DetailsCurl has issued a security advisory on a flaw found in curl-7.51: https://curl.haxx.se/docs/adv_20161221A.html
Patch to fix the issue is here: https://curl.haxx.se/CVE-2016-9586.patch |
This task depends upon
Closed by Levente Polyak (anthraxx)
Friday, 13 January 2017, 12:40 GMT
Reason for closing: Fixed
Additional comments about closing: 7.52.1-1
Friday, 13 January 2017, 12:40 GMT
Reason for closing: Fixed
Additional comments about closing: 7.52.1-1