Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in mingw-libsoup
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in mingw-libsoup
ID: FEDORA-2017-c9d8011d69
Distribution: Fedora
Plattformen: Fedora 25
Datum: Di, 22. August 2017, 18:32
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
Applikationen: libsoup

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-c9d8011d69
2017-08-22 03:34:10.616489
-------------------------------------------------------------------------------
-

Name : mingw-libsoup
Product : Fedora 25
Version : 2.56.1
Release : 1.fc25
URL : https://wiki.gnome.org/Projects/libsoup
Summary : MinGW library for HTTP and XML-RPC functionality
Description :
Libsoup is an HTTP library implementation in C. It was originally part
of a SOAP (Simple Object Access Protocol) implementation called Soup, but
the SOAP and non-SOAP parts have now been split into separate packages.

libsoup uses the Glib main loop and is designed to work well with GTK
applications. This enables GNOME applications to access HTTP servers
on the network in a completely asynchronous fashion, very similar to
the Gtk+ programming model (a synchronous operation mode is also
supported for those who want it).

This is the MinGW build of Libsoup

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2017-2885 (stack based buffer overflow with HTTP Chunked
Encoding).
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1480240 - CVE-2017-2885 mingw-libsoup: libsoup: Stack based buffer
overflow with HTTP Chunked Encoding [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1480240
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade mingw-libsoup' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung