CVEs have been requested and allocated for two security issues fixed in 0.9.32:
We have 0.9.30 in Cauldron. Here's the release details for 0.9.31 and 0.9.32:
Steps to Reproduce:
Release details for 0.9.33, a bugfix release:
libmicrohttpd-0.9.33-1.mga4 uploaded for Cauldron.
Fedora has issued an advisory for this on January 16:
Updated package uploaded for Mageia 3.
Updated libmicrohttpd packages fix security vulnerabilities:
The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow
remote attackers to obtain sensitive information or cause a denial of service
(crash) via unspecified vectors that trigger an out-of-bounds read
Stack-based buffer overflow in the MHD_digest_auth_check function in
libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to
a large value, allows remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via a long URI in an authentication header
Updated packages in core/updates_testing:
Just testing that the server starts, using info from
microspdy2http -v -p 9980 -l 192.168.10.2 -rDt4 -T 120
num curls 0
SPDY timeout 0; 0
curl timeout -1
Killed with ctrl+c. Note that 192.168.10.2 is the ip address of the
machine I'm testing on.
Testing complete on Mageia 3 i586, and advisory uploaded to svn.
Someone from the sysadmin team please pust 11936.adv to updates.
LWN reference for CVE-2013-7038: