SUSE_ALP_Standard/patchinfo.20241211125759054832.269002615871826/_patchinfo

21 lines
1.2 KiB
Plaintext

<patchinfo incident="154">
<!-- generated from request(s) 355435 -->
<issue tracker="bnc" id="1233285">VUL-0: CVE-2024-52530: libsoup,libsoup2: HTTP request smuggling via stripping null bytes from the ends of header names</issue>
<issue tracker="bnc" id="1233287">VUL-0: CVE-2024-52532: libsoup,libsoup2: libsoup: infinite loop while reading websocket data</issue>
<issue tracker="bnc" id="1233292">VUL-0: CVE-2024-52531: libsoup,libsoup2: libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict</issue>
<issue tracker="cve" id="2024-52530"/>
<issue tracker="cve" id="2024-52531"/>
<issue tracker="cve" id="2024-52532"/>
<packager>mgorse</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for libsoup2</summary>
<description>This update for libsoup2 fixes the following issues:
- CVE-2024-52530: HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285).
- CVE-2024-52532: infinite loop while reading websocket data (bsc#1233287).
- CVE-2024-52531: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292).
</description>
<package>libsoup2</package>
<seperate_build_arch/>
</patchinfo>