Sicherheit: Pufferüberlauf in mingw-libsoup
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in mingw-libsoup
ID: FEDORA-2017-1f4c82d73e
Distribution: Fedora
Plattformen: Fedora 26
Datum: Di, 22. August 2017, 14:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
Applikationen: mingw-libsoup


Fedora Update Notification
2017-08-22 03:34:10.189968

Name : mingw-libsoup
Product : Fedora 26
Version : 2.58.2
Release : 1.fc26
URL : https://wiki.gnome.org/Projects/libsoup
Summary : MinGW library for HTTP and XML-RPC functionality
Description :
Libsoup is an HTTP library implementation in C. It was originally part
of a SOAP (Simple Object Access Protocol) implementation called Soup, but
the SOAP and non-SOAP parts have now been split into separate packages.

libsoup uses the Glib main loop and is designed to work well with GTK
applications. This enables GNOME applications to access HTTP servers
on the network in a completely asynchronous fashion, very similar to
the Gtk+ programming model (a synchronous operation mode is also
supported for those who want it).

This is the MinGW build of Libsoup

Update Information:

Security fix for CVE-2017-2885 (stack based buffer overflow with HTTP Chunked

[ 1 ] Bug #1480240 - CVE-2017-2885 mingw-libsoup: libsoup: Stack based buffer
overflow with HTTP Chunked Encoding [fedora-all]

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade mingw-libsoup' at the command line.
For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux @Facebook
Neue Nachrichten