UbuntuUpdates.org

Package "libsoup-3.0-0"

Name: libsoup-3.0-0

Description:

HTTP library implementation in C -- Shared library

Latest version: 3.4.4-5ubuntu0.1
Release: noble (24.04)
Level: updates
Repository: main
Head package: libsoup3
Homepage: https://wiki.gnome.org/Projects/libsoup

Links


Download "libsoup-3.0-0"


Other versions of "libsoup-3.0-0" in Noble

Repository Area Version
base main 3.4.4-5build2
security main 3.4.4-5ubuntu0.1

Changelog

Version: 3.4.4-5ubuntu0.1 2024-11-27 05:06:56 UTC

  libsoup3 (3.4.4-5ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: Request smuggling
    - debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
      bytes in headers
    - CVE-2024-52530
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2024-52531-1.patch: Be more robust against
      invalid input when parsing params
    - debian/patches/CVE-2024-52531-2.patch: Add test for passing
      invalid UTF-8 to soup_header_parse_semi_param_list()
    - CVE-2024-52531
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-52532-1.patch: process the frame as soon
      as data is read
    - debian/patches/CVE-2024-52532-2.patch: disconnect error copy
      after the test ends
    - CVE-2024-52532

 -- Bruce Cable <email address hidden> Mon, 18 Nov 2024 15:21:40 +1100

CVE-2024-52530 GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e.,
CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input re
CVE-2024-52532 GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.



About   -   Send Feedback to @ubuntu_updates