ChangeLog for: 2013-02-08 04:57:05

a/elilo-3.14-x86_64-1.txz: Added. d/llvm-3.2-x86_64-3.txz: Rebuilt. Fixed a few places where lib64 was hardcoded regardless of $ARCH. Thanks to Heinz Wiesinger. l/sdl-1.2.15-x86_64-1.txz: Upgraded. Upgraded to SDL-1.2.15, SDL_image-1.2.12, SDL_mixer-1.2.12, SDL_net-1.2.8, and SDL_ttf-2.0.11. Patched resizing and mouse clicking bugs. n/curl-7.29.0-x86_64-1.txz: Upgraded. When negotiating SASL DIGEST-MD5 authentication, the function Curl_sasl_create_digest_md5_message() uses the data provided from the server without doing the proper length checks and that data is then appended to a local fixed-size buffer on the stack. This vulnerability can be exploited by someone who is in control of a server that a libcurl based program is accessing with POP3, SMTP or IMAP. For applications that accept user provided URLs, it is also thinkable that a malicious user would feed an application with a URL to a server hosting code targeting this flaw. Affected versions: curl 7.26.0 to and including 7.28.1 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249 (* Security fix *)