First published: Wed Jul 04 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libsoup | =2.63.2 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Ansible Tower | =3.3 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
openSUSE Leap | =15.0 | |
debian/libsoup2.4 | 2.72.0-2 2.74.3-1 2.74.3-8 |
https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12910 is a vulnerability in libsoup 2.63.2 that allows attackers to have an unspecified impact via an empty hostname in the get_cookies function.
CVE-2018-12910 has a severity level of critical with a CVSS score of 9.8.
CVE-2018-12910 affects libsoup 2.63.2, 2.62.2-2, 2.52.2-1ubuntu0.3, 2.60.1-1ubuntu0.1, 2.62.1-1ubuntu0.1, 2.44.2-1ubuntu2.3, 2.64.2-2, 2.72.0-2, and 2.74.3-1.
To fix CVE-2018-12910, upgrade to a version of libsoup that is not affected by the vulnerability, such as 2.64.2-2, 2.72.0-2, or 2.74.3-1.
You can find more information about CVE-2018-12910 at the following references: [link1](https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f), [link2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/), [link3](https://www.debian.org/security/2018/dsa-4241).