Adding patchinfo patchinfo.20241211125759054832.269002615871826

This commit is contained in:
Adrian Schröter 2024-12-12 15:59:21 +01:00
parent edf20f5626
commit 302b030650
2 changed files with 22 additions and 1 deletions

@ -1 +1 @@
Subproject commit b7833069f998461c6d8b52671240d882781025aa
Subproject commit 967b4df3c6bb1ab461710d812b7f9f5343a85147

View File

@ -0,0 +1,21 @@
<patchinfo>
<!-- generated from request(s) 355435 -->
<issue tracker="bnc" id="1233285">VUL-0: CVE-2024-52530: libsoup,libsoup2: HTTP request smuggling via stripping null bytes from the ends of header names</issue>
<issue tracker="bnc" id="1233287">VUL-0: CVE-2024-52532: libsoup,libsoup2: libsoup: infinite loop while reading websocket data</issue>
<issue tracker="bnc" id="1233292">VUL-0: CVE-2024-52531: libsoup,libsoup2: libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict</issue>
<issue tracker="cve" id="2024-52530"/>
<issue tracker="cve" id="2024-52531"/>
<issue tracker="cve" id="2024-52532"/>
<packager>mgorse</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for libsoup2</summary>
<description>This update for libsoup2 fixes the following issues:
- CVE-2024-52530: HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285).
- CVE-2024-52532: infinite loop while reading websocket data (bsc#1233287).
- CVE-2024-52531: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292).
</description>
<package>libsoup2</package>
<seperate_build_arch/>
</patchinfo>