UbuntuUpdates.org

Package "libsoup-gnome2.4-dev"

Name: libsoup-gnome2.4-dev

Description:

HTTP library implementation in C -- GNOME support development files

Latest version: 2.74.3-6ubuntu1.1
Release: noble (24.04)
Level: updates
Repository: main
Head package: libsoup2.4
Homepage: https://wiki.gnome.org/Projects/libsoup

Links


Download "libsoup-gnome2.4-dev"


Other versions of "libsoup-gnome2.4-dev" in Noble

Repository Area Version
base main 2.74.3-6ubuntu1
security main 2.74.3-6ubuntu1.1

Changelog

Version: 2.74.3-6ubuntu1.1 2024-11-27 05:06:56 UTC

  libsoup2.4 (2.74.3-6ubuntu1.1) noble-security; urgency=medium

  * SECURITY UPDATE: Request smuggling
    - debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
      bytes in headers
    - CVE-2024-52530
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2024-52531-1.patch: Be more robust against
      invalid input when parsing params
    - debian/patches/CVE-2024-52531-2.patch: Add test for passing
      invalid UTF-8 to soup_header_parse_semi_param_list()
    - CVE-2024-52531
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-52532-1.patch: process the frame as soon
      as data is read
    - debian/patches/CVE-2024-52532-2.patch: disconnect error copy
      after the test ends
    - CVE-2024-52532

 -- Bruce Cable <email address hidden> Tue, 19 Nov 2024 09:24:43 +1100

CVE-2024-52530 GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e.,
CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input re
CVE-2024-52532 GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.



About   -   Send Feedback to @ubuntu_updates