drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in libsoup
Name: |
Pufferüberlauf in libsoup |
|
ID: |
FEDORA-2017-b0ec173bd1 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 26 |
|
Datum: |
Mo, 14. August 2017, 07:59 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885 |
|
Applikationen: |
libsoup |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2017-b0ec173bd1 2017-08-13 17:48:59.925520 ------------------------------------------------------------------------------- -
Name : libsoup Product : Fedora 26 Version : 2.58.2 Release : 1.fc26 URL : https://wiki.gnome.org/Projects/libsoup Summary : Soup, an HTTP library implementation Description : Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages.
libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it).
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2017-2885 (stack based buffer overflow with HTTP Chunked Encoding). ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1479281 - CVE-2017-2885 libsoup: Stack based buffer overflow with HTTP Chunked Encoding https://bugzilla.redhat.com/show_bug.cgi?id=1479281 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade libsoup' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
|
|
|
|