MGASA-2024-0382 - Updated libsoup3 & libsoup packages fix security vulnerabilities

Publication date: 29 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0382.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-52530,
     CVE-2024-52531,
     CVE-2024-52532

GNOME libsoup before 3.6.0 allows HTTP request smuggling in some
configurations because '\0' characters at the end of header names are
ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the
same as a "Transfer-Encoding: chunked" header. (CVE-2024-52530)
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that
perform conversion to UTF-8 in soup_header_parse_param_list_strict.
Input received over the network cannot trigger this. (CVE-2024-52531)
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption.
during the reading of certain patterns of WebSocket data from clients.
(CVE-2024-52532)

References:
- https://bugs.mageia.org/show_bug.cgi?id=33765
- https://www.openwall.com/lists/oss-security/2024/11/09/2
- https://www.openwall.com/lists/oss-security/2024/11/12/8
- https://ubuntu.com/security/notices/USN-7126-1
- https://ubuntu.com/security/notices/USN-7127-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532

SRPMS:
- 9/core/libsoup3-3.4.2-1.1.mga9
- 9/core/libsoup-2.74.3-1.1.mga9

Mageia 2024-0382: libsoup3 & libsoup Security Advisory Updates

GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunke...

Summary

GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header. (CVE-2024-52530) GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. (CVE-2024-52531) GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. (CVE-2024-52532)

References

- https://bugs.mageia.org/show_bug.cgi?id=33765

- https://www.openwall.com/lists/oss-security/2024/11/09/2

- https://www.openwall.com/lists/oss-security/2024/11/12/8

- https://ubuntu.com/security/notices/USN-7126-1

- https://ubuntu.com/security/notices/USN-7127-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532

Resolution

MGASA-2024-0382 - Updated libsoup3 & libsoup packages fix security vulnerabilities

SRPMS

- 9/core/libsoup3-3.4.2-1.1.mga9

- 9/core/libsoup-2.74.3-1.1.mga9

Severity
Publication date: 29 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0382.html
Type: security
CVE: CVE-2024-52530, CVE-2024-52531, CVE-2024-52532

Related News