It was discovered that the Soup HTTP library performed insufficient validation of cookie requests which could result in an out-of-bounds memory read. For the stable distribution (stretch), this problem has been fixed in version 2.56.0-2+deb9u2. We recommend that you upgrade your libsoup2.4 packages. For the detailed security status of libsoup2.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libsoup2.4
It was discovered that the Soup HTTP library performed insufficient validation of cookie requests which could result in an out-of-bounds memory read.
For the stable distribution (stretch), this problem has been fixed in version 2.56.0-2+deb9u2.
We recommend that you upgrade your libsoup2.4 packages.
For the detailed security status of libsoup2.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libsoup2.4