Package "libsoup-gnome2.4-1"
Name: |
libsoup-gnome2.4-1
|
Description: |
HTTP library implementation in C -- GNOME support library
|
Latest version: |
2.74.2-3ubuntu0.1 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Head package: |
libsoup2.4 |
Homepage: |
https://wiki.gnome.org/Projects/libsoup |
Links
Download "libsoup-gnome2.4-1"
Other versions of "libsoup-gnome2.4-1" in Jammy
Changelog
libsoup2.4 (2.74.2-3ubuntu0.1) jammy-security; urgency=medium
* SECURITY UPDATE: Request smuggling
- debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
bytes in headers
- CVE-2024-52530
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2024-52531-1.patch: Be more robust against
invalid input when parsing params
- debian/patches/CVE-2024-52531-2.patch: Add test for passing
invalid UTF-8 to soup_header_parse_semi_param_list()
- CVE-2024-52531
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2024-52532-1.patch: process the frame as soon
as data is read
- debian/patches/CVE-2024-52532-2.patch: disconnect error copy
after the test ends
- CVE-2024-52532
-- Bruce Cable <email address hidden> Tue, 19 Nov 2024 09:24:38 +1100
|
CVE-2024-52530 |
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., |
CVE-2024-52531 |
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input re |
CVE-2024-52532 |
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. |
|
About
-
Send Feedback to @ubuntu_updates