|
|
Subscribe / Log in / New account

Mageia alert MGASA-2024-0382 (libsoup3 & libsoup)

From:  Mageia Updates <updates-announce@ml.mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2024-0382: Updated libsoup3 & libsoup packages fix security vulnerabilities
Date:  Sat, 30 Nov 2024 00:36:54 +0100
Message-ID:  <20241129233654.D31C09FE5F@duvel.mageia.org>
Archive-link:  Article

MGASA-2024-0382 - Updated libsoup3 & libsoup packages fix security vulnerabilities Publication date: 29 Nov 2024 URL: https://advisories.mageia.org/MGASA-2024-0382.html Type: security Affected Mageia releases: 9 CVE: CVE-2024-52530, CVE-2024-52531, CVE-2024-52532 Description: GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header. (CVE-2024-52530) GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. (CVE-2024-52531) GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. (CVE-2024-52532) References: - https://bugs.mageia.org/show_bug.cgi?id=33765 - https://www.openwall.com/lists/oss-security/2024/11/09/2 - https://www.openwall.com/lists/oss-security/2024/11/12/8 - https://ubuntu.com/security/notices/USN-7126-1 - https://ubuntu.com/security/notices/USN-7127-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5... SRPMS: - 9/core/libsoup3-3.4.2-1.1.mga9 - 9/core/libsoup-2.74.3-1.1.mga9


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds