-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                ESB-2007.0028 -- [UNIX/Linux][Debian][OSX]
                New libsoup packages fix denial of service
                              15 January 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              libsoup
Publisher:            Debian
Operating System:     Debian GNU/Linux 3.1
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-5876

Original Bulletin:    http://www.debian.org/security/2007/dsa-1248

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1248-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
January 12nd, 2007                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : libsoup
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-5876
Debian Bug     : 405197

Roland Lezuo and Josselin Mouette discovered that the libsoup HTTP
library performs insufficient sanitising when parsing HTTP headers,
which might lead to denial of service.

For the stable distribution (sarge) this problem has been fixed in
version 2.2.3-2sarge1.

For the upcoming stable distribution (etch) this problem has been
fixed in version 2.2.98-2.

For the unstable distribution (sid) this problem has been fixed in
version 2.2.98-2.

We recommend that you upgrade your libsoup package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3-2sarge1.dsc
      Size/MD5 checksum:      679 adbad6fcde3be4be01c8eac2da55c712
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3-2sarge1.diff.gz
      Size/MD5 checksum:    77637 62b8b84a032e79802788ac8fad2a8b1a
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3.orig.tar.gz
      Size/MD5 checksum:   479599 1c3e8c05a702340f9170d30a370a7344

  Architecture independent components:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-doc_2.2.3-2sarge1_all.deb
      Size/MD5 checksum:    89712 28de5acce82f292d53488316d4d21f47

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_alpha.deb
      Size/MD5 checksum:   121006 63acdee0902aef63cd9de5234ba4c75f
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_alpha.deb
      Size/MD5 checksum:   179700 cae14f17a787681ffd64af595df4320a

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_amd64.deb
      Size/MD5 checksum:   109672 d36f765bcd4bf336f9dfd3efa93aca01
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_amd64.deb
      Size/MD5 checksum:   137628 48e8ae141d696f82c38a8e4464da7624

  ARM architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_arm.deb
      Size/MD5 checksum:   100968 2a51612277c7fb122d7244729bdabc3c
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_arm.deb
      Size/MD5 checksum:   134098 213cfe1f767b22eb8baedaf7dae4e705

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_hppa.deb
      Size/MD5 checksum:   118582 4a28fbaff712a41026027e46477b2db4
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_hppa.deb
      Size/MD5 checksum:   150680 0a5331f409f1255a7afe2136a7b75efa

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_i386.deb
      Size/MD5 checksum:   103256 cc59e5bfe0236843a9f035e21084472e
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_i386.deb
      Size/MD5 checksum:   124718 1a9f5949d15ee315df06dd7d4f030bad

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_ia64.deb
      Size/MD5 checksum:   137120 3036044195764214e74f6e94e557f373
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_ia64.deb
      Size/MD5 checksum:   180256 48c1f4958dd773f963228874cf3b0493

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_m68k.deb
      Size/MD5 checksum:   104094 ca8ef51bd4f5622530fb246818b9bd38
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_m68k.deb
      Size/MD5 checksum:   119564 1400d2fdaa1416454a4bd1a6260064d4

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_mips.deb
      Size/MD5 checksum:   102578 5cc6cb77f78a633b718111b01cd1ac56
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_mips.deb
      Size/MD5 checksum:   145276 89f3fbf38a9a3a6c23d2c7c403a25e35

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_mipsel.deb
      Size/MD5 checksum:   102560 5f8c1dc2888c63b5fb7cbc7e765227a1
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_mipsel.deb
      Size/MD5 checksum:   145232 1ab42e08c45e37a8c42db91eb0d05582

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_powerpc.deb
      Size/MD5 checksum:   106390 57dc0f86443250f7160202c3514f8e5e
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_powerpc.deb
      Size/MD5 checksum:   139376 25103bd1d805b97fc9d524602afce1ea

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_s390.deb
      Size/MD5 checksum:   115614 2e5422ec386daf008dd8d8c8af725366
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_s390.deb
      Size/MD5 checksum:   138072 2d692116c7e50dde248f58b85d9ebdfd

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_sparc.deb
      Size/MD5 checksum:   105966 da20be0e50755c15ead7dca8a7327ecc
    http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_sparc.deb
      Size/MD5 checksum:   131482 2622023dd2bc6508aeb6a200ba904260


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFqA1lXm3vHE4uyloRAgTdAKC2irXIj5cOEZ2OABr26K7idnDVxgCgwvsa
cP5laJvgwLs7fTBxBw+dqgQ=
=9kaq
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRarwtSh9+71yA2DNAQKSZwQAg9egmTGTMNC9COAdEbgj/lbszbwtk+r9
672qT/mB5xqGfyKOwuAG8qz533baWCmQLMzyqLxxHlAa3Pf85TUaEGcwg7T3gsU3
xHMqxpT/wNVyC7DLPY1tFdGvVAmtTKOhjPd6fakg2Aq8+K7RpKYWfU82xC6NB5Tx
yivWDrdP1+E=
=wMsu
-----END PGP SIGNATURE-----