Source: libsoup3 Version: 3.6.0-2 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for libsoup3. CVE-2024-52531[0]: | GNOME libsoup before 3.6.1 allows a buffer overflow in applications | that perform conversion to UTF-8 in | soup_header_parse_param_list_strict. Input received over the network | cannot trigger this. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-52531 https://www.cve.org/CVERecord?id=CVE-2024-52531 [2] https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407 [3] https://gitlab.gnome.org/GNOME/libsoup/-/commit/3c54033634ae537b52582900a7ba432c52ae8174 [4] https://gitlab.gnome.org/GNOME/libsoup/-/commit/a35222dd0bfab2ac97c10e86b95f762456628283 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

