UbuntuUpdates.org

Package "libsoup2.4-tests"

Name: libsoup2.4-tests

Description:

HTTP library implementation in C -- installed tests

Latest version: 2.74.2-3ubuntu0.1
Release: jammy (22.04)
Level: security
Repository: universe
Head package: libsoup2.4
Homepage: https://wiki.gnome.org/Projects/libsoup

Links


Download "libsoup2.4-tests"


Other versions of "libsoup2.4-tests" in Jammy

Repository Area Version
base universe 2.74.2-3
updates universe 2.74.2-3ubuntu0.1

Changelog

Version: 2.74.2-3ubuntu0.1 2024-11-27 03:06:56 UTC

  libsoup2.4 (2.74.2-3ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Request smuggling
    - debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
      bytes in headers
    - CVE-2024-52530
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2024-52531-1.patch: Be more robust against
      invalid input when parsing params
    - debian/patches/CVE-2024-52531-2.patch: Add test for passing
      invalid UTF-8 to soup_header_parse_semi_param_list()
    - CVE-2024-52531
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-52532-1.patch: process the frame as soon
      as data is read
    - debian/patches/CVE-2024-52532-2.patch: disconnect error copy
      after the test ends
    - CVE-2024-52532

 -- Bruce Cable <email address hidden> Tue, 19 Nov 2024 09:24:38 +1100

CVE-2024-52530 GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e.,
CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input re
CVE-2024-52532 GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.



About   -   Send Feedback to @ubuntu_updates