-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4241-1 security@xxxxxxxxxx https://www.debian.org/security/ Moritz Muehlenhoff July 05, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libsoup2.4 CVE ID : CVE-2018-12910 It was discovered that the Soup HTTP library performed insuffient validation of cookie requests which could result in an out-of-bounds memory read. For the stable distribution (stretch), this problem has been fixed in version 2.56.0-2+deb9u2. We recommend that you upgrade your libsoup2.4 packages. For the detailed security status of libsoup2.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libsoup2.4 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAls+hhkACgkQEMKTtsN8 TjZFhhAAhAjQG+6P1YZ6E8YTL0bGtwZOwRArNSHgxWt4NSM3FHkBNVtLlZzkBTA0 cCzuhr+wn/U1ovICHtYyz1etRS7nGMNW9MKjx1x3AcbtSYQcrgVo3mSzDASE5AN2 /3Ayjj7m+KFb3NkXydhIdD4kRBMoB+I71o2mNDlQ+iJ8stF2yJB/4tYzYKpG1MZn xp0ddJPWIRIAZrqwj1xwr2RmSJQsdvJsiDDGbVtlMEWXkHos68g6L/wwPp1qYblH 40v1N84eXPRW6uOxkP+QiabRePYGNqjzj22b/AkP5DWyDTC3TYF7S084lZ6TeYss 7PYbDmWIXU1xp63PvDWpHI83eda4DuC8AA74AFzERozlJN6a4FUy5YlcL7CI0Pag 9pKvkA+LkYsgzpD8hTk3uT0OSpo3kmdI4I9URsJj2AG4fx+qWkgCD9vSLDLEywf+ 3GSCDTaTCG4HdicSXI8oQLFAmf9FRZcD/dkhp21k5O7ih+Al8Kfv7H4Vw/+l25Hh 0n5pTbmhsBwg1weNQPoSX2ACcy4M8/qGVtHU7Ya3ehlSiI37+ikCnJ+rpUt1pAl3 eC/wpWQcvODAoREeRKxtatuwAN4cf3mmybSVW2qlaL/CHOaIfmDS4NJ/Yk79tS8W DLV//Y7R4FsFt054BczsSmpYe7Rg+eNw0ndyArp6002H75ffD0k= =Uvqk -----END PGP SIGNATURE-----