Package "libsoup-3.0-doc"
Name: |
libsoup-3.0-doc
|
Description: |
HTTP library implementation in C -- API Reference
|
Latest version: |
3.4.4-5ubuntu0.1 |
Release: |
noble (24.04) |
Level: |
updates |
Repository: |
main |
Head package: |
libsoup3 |
Homepage: |
https://wiki.gnome.org/Projects/libsoup |
Links
Download "libsoup-3.0-doc"
Other versions of "libsoup-3.0-doc" in Noble
Changelog
libsoup3 (3.4.4-5ubuntu0.1) noble-security; urgency=medium
* SECURITY UPDATE: Request smuggling
- debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
bytes in headers
- CVE-2024-52530
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2024-52531-1.patch: Be more robust against
invalid input when parsing params
- debian/patches/CVE-2024-52531-2.patch: Add test for passing
invalid UTF-8 to soup_header_parse_semi_param_list()
- CVE-2024-52531
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2024-52532-1.patch: process the frame as soon
as data is read
- debian/patches/CVE-2024-52532-2.patch: disconnect error copy
after the test ends
- CVE-2024-52532
-- Bruce Cable <email address hidden> Mon, 18 Nov 2024 15:21:40 +1100
|
CVE-2024-52530 |
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., |
CVE-2024-52531 |
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input re |
CVE-2024-52532 |
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. |
|
About
-
Send Feedback to @ubuntu_updates