{"id":"MGASA-2017-0221","summary":"Updated gsoap packages fix security vulnerability","details":"A potential vulnerability to a large and specific XML message over 2GB\nin size (greater than 2147483711 bytes to trigger the software bug). A\nbuffer overflow can cause an open unsecured server to crash or\nmalfunction after 2GB is received (CVE-2017-9765).\n","modified":"2026-04-16T06:23:40.808251676Z","published":"2017-07-25T22:07:12Z","upstream":["CVE-2017-9765"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0221.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21298"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2017/07/19/7"}],"affected":[{"package":{"name":"gsoap","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/gsoap?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.8.49-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0221.json"}},{"package":{"name":"gsoap","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/gsoap?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.8.49-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0221.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}