Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#52250 - [curl]unitialized random security flaw in 7.52 (CVE-2016-9594)
Attached to Project:
Arch Linux
Opened by Filip Frackiewicz (notreallyhere) - Friday, 23 December 2016, 11:49 GMT
Last edited by Jan de Groot (JGC) - Wednesday, 04 January 2017, 11:00 GMT
Opened by Filip Frackiewicz (notreallyhere) - Friday, 23 December 2016, 11:49 GMT
Last edited by Jan de Groot (JGC) - Wednesday, 04 January 2017, 11:00 GMT
|
DetailsA new security flaw has been discovered in curl 7.52:
https://curl.haxx.se/docs/adv_20161223.html A patch has been issued: https://curl.haxx.se/CVE-2016-9594.patch |
This task depends upon
Closed by Jan de Groot (JGC)
Wednesday, 04 January 2017, 11:00 GMT
Reason for closing: Fixed
Additional comments about closing: We skipped 7.52.0
Wednesday, 04 January 2017, 11:00 GMT
Reason for closing: Fixed
Additional comments about closing: We skipped 7.52.0

well we are not affected as we dont have 7.52.0 but surly we will skip it and go to 7.52.1