Home / mailings [USN-3383-1] libsoup vulnerability
Posted on 10 August 2017
Ubuntu Security--===============2142685145135851920==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="y5m36xyyu6v4iqwj"
Content-Disposition: inline
--y5m36xyyu6v4iqwj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================================
Ubuntu Security Notice USN-3383-1
August 10, 2017
libsoup2.4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Applications using libsoup could be made to crash or run programs
as your login if it received specially crafted network traffic.
Software Description:
- libsoup2.4: HTTP client/server library for GNOME
Details:
Aleksandar Nikolic discovered a stack based buffer overflow when
handling chunked encoding. An attacker could use this to cause a
denial of service or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
gir1.2-soup-2.4 2.56.0-2ubuntu0.1
libsoup-gnome2.4-1 2.56.0-2ubuntu0.1
libsoup2.4-1 2.56.0-2ubuntu0.1
Ubuntu 16.04 LTS:
gir1.2-soup-2.4 2.52.2-1ubuntu0.2
libsoup-gnome2.4-1 2.52.2-1ubuntu0.2
libsoup2.4-1 2.52.2-1ubuntu0.2
Ubuntu 14.04 LTS:
gir1.2-soup-2.4 2.44.2-1ubuntu2.2
libsoup-gnome2.4-1 2.44.2-1ubuntu2.2
libsoup2.4-1 2.44.2-1ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3383-1
CVE-2017-2885
Package Information:
https://launchpad.net/ubuntu/+source/libsoup2.4/2.56.0-2ubuntu0.1
https://launchpad.net/ubuntu/+source/libsoup2.4/2.52.2-1ubuntu0.2
https://launchpad.net/ubuntu/+source/libsoup2.4/2.44.2-1ubuntu2.2