diff --git a/libsoup2 b/libsoup2 index b783306..967b4df 160000 --- a/libsoup2 +++ b/libsoup2 @@ -1 +1 @@ -Subproject commit b7833069f998461c6d8b52671240d882781025aa +Subproject commit 967b4df3c6bb1ab461710d812b7f9f5343a85147 diff --git a/patchinfo.20241211125759054832.269002615871826/_patchinfo b/patchinfo.20241211125759054832.269002615871826/_patchinfo new file mode 100644 index 0000000..5c9559d --- /dev/null +++ b/patchinfo.20241211125759054832.269002615871826/_patchinfo @@ -0,0 +1,21 @@ + + + VUL-0: CVE-2024-52530: libsoup,libsoup2: HTTP request smuggling via stripping null bytes from the ends of header names + VUL-0: CVE-2024-52532: libsoup,libsoup2: libsoup: infinite loop while reading websocket data + VUL-0: CVE-2024-52531: libsoup,libsoup2: libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict + + + + mgorse + important + security + Security update for libsoup2 + This update for libsoup2 fixes the following issues: + +- CVE-2024-52530: HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285). +- CVE-2024-52532: infinite loop while reading websocket data (bsc#1233287). +- CVE-2024-52531: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292). + + libsoup2 + +