Home > Security > Advisories

Advisories

Mandriva Advisories

Package name libsoup
Date January 26th, 2007
Advisory ID MDKSA-2007:029
Affected versions CS3.0, 2006.0, 2007.0
Synopsis Updated libsoup packages fix DoS vulnerability

Problem Description

The soup_headers_parse function in soup-headers.c for libsoup HTTP
library before 2.2.99 allows remote attackers to cause a denial of
service (crash) via malformed HTTP headers, probably involving missing
fields or values.

The updated packages have been patched to correct this issue.

Updated Packages

Corporate Server 3.0

 60c23eb5f8875a2438dc8e8c7a5a51c3  corporate/3.0/i586/libsoup-1.99.28-1.1.C30mdk.i586.rpm
 7107ef4818fbddbe892043bf273c8286  corporate/3.0/i586/libsoup-2.0_0-1.99.28-1.1.C30mdk.i586.rpm
 fd8a36bef1ac3e441f1636d5fb2a29e0  corporate/3.0/i586/libsoup-2.0_0-devel-1.99.28-1.1.C30mdk.i586.rpm 
 90e23de46abc7f6ddddb9d3d489f4d52  corporate/3.0/SRPMS/libsoup-1.99.28-1.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 8ef5d3702721442e8eafd7ff3be5a5f2  corporate/3.0/x86_64/lib64soup-2.0_0-1.99.28-1.1.C30mdk.x86_64.rpm
 a39fcf606ebf0c1b5a96283de9f4441f  corporate/3.0/x86_64/lib64soup-2.0_0-devel-1.99.28-1.1.C30mdk.x86_64.rpm
 ec4dc1c6a94e2954a350d0fc25d10d89  corporate/3.0/x86_64/libsoup-1.99.28-1.1.C30mdk.x86_64.rpm 
 90e23de46abc7f6ddddb9d3d489f4d52  corporate/3.0/SRPMS/libsoup-1.99.28-1.1.C30mdk.src.rpm

Mandriva Linux 2006

 4f2b5a0d73c7a7a8d44c993a7d5aa0c2  2006.0/i586/libsoup-2.2_7-2.2.3-2.1.20060mdk.i586.rpm
 b908d651b283f7aad2914cc45621779d  2006.0/i586/libsoup-2.2_7-devel-2.2.3-2.1.20060mdk.i586.rpm 
 fa63dfce230031c179c38c2d4dfef3c0  2006.0/SRPMS/libsoup-2.2.3-2.1.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 f0fc3b38d4da6d0f852df61a58fa14e9  2006.0/x86_64/lib64soup-2.2_7-2.2.3-2.1.20060mdk.x86_64.rpm
 e37aa16dcb0904d3d2bb6c16c192ce31  2006.0/x86_64/lib64soup-2.2_7-devel-2.2.3-2.1.20060mdk.x86_64.rpm 
 fa63dfce230031c179c38c2d4dfef3c0  2006.0/SRPMS/libsoup-2.2.3-2.1.20060mdk.src.rpm

Mandriva Linux 2007

 361254f9fc671c76de0c5b932ef59fbf  2007.0/i586/libsoup-2.2_8-2.2.96-1.1mdv2007.0.i586.rpm
 31b044996c030de2563d4cd73c9f53c3  2007.0/i586/libsoup-2.2_8-devel-2.2.96-1.1mdv2007.0.i586.rpm 
 78e22b0c5511c6bcd1db2618ad824603  2007.0/SRPMS/libsoup-2.2.96-1.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 fc917532647266dc40b4ea5c9c0032c4  2007.0/x86_64/lib64soup-2.2_8-2.2.96-1.1mdv2007.0.x86_64.rpm
 e169e51e44a32987e02f78d9b3773011  2007.0/x86_64/lib64soup-2.2_8-devel-2.2.96-1.1mdv2007.0.x86_64.rpm 
 78e22b0c5511c6bcd1db2618ad824603  2007.0/SRPMS/libsoup-2.2.96-1.1mdv2007.0.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.