what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 34401

Secunia Security Advisory 34401
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libsoup. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | dcbfd53275f1fa8c9df210f5c2565a4ab026ea5a33254b984ba0890a838e9d94

Secunia Security Advisory 34401

Change Mirror Download
----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia
report for 2008.

Highlights from the 2008 report:
* Vulnerability Research
* Software Inspection Results
* Secunia Research Highlights
* Secunia Advisory Statistics

Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


----------------------------------------------------------------------

TITLE:
Debian update for libsoup

SECUNIA ADVISORY ID:
SA34401

VERIFY ADVISORY:
http://secunia.com/advisories/34401/

DESCRIPTION:
Debian has issued an update for libsoup. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise
an application using the library.

For more information:
SA34310

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98-2+etch1.diff.gz
Size/MD5 checksum: 6510 65ab0f023a150170e8a181890a00b023
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98-2+etch1.dsc
Size/MD5 checksum: 1537 cd5b947c0b3b9203aa52f6d0ec40821c
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98.orig.tar.gz
Size/MD5 checksum: 692665 b20e2a41ab0d21cc8d84fd76b4dbf47b

Architecture independent packages:

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-doc_2.2.98-2+etch1_all.deb
Size/MD5 checksum: 148102 b1e78a8f3396ae6d58f3cf3889c8c6ff

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_alpha.deb
Size/MD5 checksum: 143528 45221b9485dd0b1d7a5b2a0dc68b1dc0
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_alpha.deb
Size/MD5 checksum: 225664 646feecbfdae326e7e131682c87eb490

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_amd64.deb
Size/MD5 checksum: 173460 91bbd9ff1aba8b8a5739fee06c67d5c8
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_amd64.deb
Size/MD5 checksum: 134338 4f0863cdc2d1d2b11020ea48d383da47

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_arm.deb
Size/MD5 checksum: 156102 5b9fc9b512df31fc13545b1ad5b58b59
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_arm.deb
Size/MD5 checksum: 122166 1f7ffd4f62f0e3da5dfda7bba9b6cf8e

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_i386.deb
Size/MD5 checksum: 159014 ceff344964f226cbe0c3d9fe33d269c1
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_i386.deb
Size/MD5 checksum: 127618 233269397ec53a7728efbbe4bb5ffdbf

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_ia64.deb
Size/MD5 checksum: 166682 3e731257e90366342668ae79a62d765c
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_ia64.deb
Size/MD5 checksum: 224356 ef42597d156076f2c8b14719ba86b6f7

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_mips.deb
Size/MD5 checksum: 123812 4cf102e455c0dbd0b216ba566a0c0ab8
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_mips.deb
Size/MD5 checksum: 186234 cd10eebffdc0cd2d3054312e33e4ce8e

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_mipsel.deb
Size/MD5 checksum: 123834 98548a14e5ce79bebb383a6aecee4c98
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_mipsel.deb
Size/MD5 checksum: 184598 95aaf80730c26f9d8d157946b2ac5647

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_powerpc.deb
Size/MD5 checksum: 129934 eed29efd7504d5773dfc3f9e63b86a8f
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_powerpc.deb
Size/MD5 checksum: 174982 d03e2f8a85f8e3f34f66adcd828cc96e

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_s390.deb
Size/MD5 checksum: 138932 6cddb3baf9116f406a24b3a9a0704bbf
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_s390.deb
Size/MD5 checksum: 173034 152912e389a2e79703e7b99754815f8d

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_sparc.deb
Size/MD5 checksum: 127078 ce5d52474147b2df700df515920bd392
http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_sparc.deb
Size/MD5 checksum: 163488 07d3e61ff2b929e005f9a66a2ad8354d

ORIGINAL ADVISORY:
DSA-1748-1:
http://lists.debian.org/debian-security-announce/2009/msg00058.html

OTHER REFERENCES:
SA34310:
http://secunia.com/advisories/34310/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close