LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New libsoup packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian It was discovered that libsoup, an HTTP library implementation in C, handles large strings insecurely via its Base64 encoding functions. This could possibly lead to the execution of arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1748-1                  security@debian.org
http://www.debian.org/security/                      Steffen Joeris
March 20, 2009   	                http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : libsoup
Vulnerability  : integer overflow
Problem type   : local (remote)
Debian-specific: no
CVE Id         : CVE-2009-0585
Debian Bugs    : 520039


It was discovered that libsoup, an HTTP library implementation in C,
handles large strings insecurely via its Base64 encoding functions. This
could possibly lead to the execution of arbitrary code.


For the oldstable distribution (etch), this problem has been fixed in
version 2.2.98-2+etch1.

The stable distribution (lenny) is not affected by this issue.

The testing distribution (squeeze) and the unstable distribution (sid)
are not affected by this issue.


We recommend that you upgrade your libsoup packages.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98-2+etch1.diff.gz
    Size/MD5 checksum:     6510 65ab0f023a150170e8a181890a00b023
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98-2+etch1.dsc
    Size/MD5 checksum:     1537 cd5b947c0b3b9203aa52f6d0ec40821c
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.98.orig.tar.gz
    Size/MD5 checksum:   692665 b20e2a41ab0d21cc8d84fd76b4dbf47b

Architecture independent packages:

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-doc_2.2.98-2+etch1_all.deb
    Size/MD5 checksum:   148102 b1e78a8f3396ae6d58f3cf3889c8c6ff

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_alpha.deb
    Size/MD5 checksum:   143528 45221b9485dd0b1d7a5b2a0dc68b1dc0
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_alpha.deb
    Size/MD5 checksum:   225664 646feecbfdae326e7e131682c87eb490

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_amd64.deb
    Size/MD5 checksum:   173460 91bbd9ff1aba8b8a5739fee06c67d5c8
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_amd64.deb
    Size/MD5 checksum:   134338 4f0863cdc2d1d2b11020ea48d383da47

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_arm.deb
    Size/MD5 checksum:   156102 5b9fc9b512df31fc13545b1ad5b58b59
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_arm.deb
    Size/MD5 checksum:   122166 1f7ffd4f62f0e3da5dfda7bba9b6cf8e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_i386.deb
    Size/MD5 checksum:   159014 ceff344964f226cbe0c3d9fe33d269c1
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_i386.deb
    Size/MD5 checksum:   127618 233269397ec53a7728efbbe4bb5ffdbf

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_ia64.deb
    Size/MD5 checksum:   166682 3e731257e90366342668ae79a62d765c
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_ia64.deb
    Size/MD5 checksum:   224356 ef42597d156076f2c8b14719ba86b6f7

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_mips.deb
    Size/MD5 checksum:   123812 4cf102e455c0dbd0b216ba566a0c0ab8
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_mips.deb
    Size/MD5 checksum:   186234 cd10eebffdc0cd2d3054312e33e4ce8e

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_mipsel.deb
    Size/MD5 checksum:   123834 98548a14e5ce79bebb383a6aecee4c98
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_mipsel.deb
    Size/MD5 checksum:   184598 95aaf80730c26f9d8d157946b2ac5647

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_powerpc.deb
    Size/MD5 checksum:   129934 eed29efd7504d5773dfc3f9e63b86a8f
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_powerpc.deb
    Size/MD5 checksum:   174982 d03e2f8a85f8e3f34f66adcd828cc96e

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_s390.deb
    Size/MD5 checksum:   138932 6cddb3baf9116f406a24b3a9a0704bbf
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_s390.deb
    Size/MD5 checksum:   173034 152912e389a2e79703e7b99754815f8d

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-8_2.2.98-2+etch1_sparc.deb
    Size/MD5 checksum:   127078 ce5d52474147b2df700df515920bd392
  http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.98-2+etch1_sparc.deb
    Size/MD5 checksum:   163488 07d3e61ff2b929e005f9a66a2ad8354d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Disaster as CryptoWall encrypts US firm's entire server installation
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.