This bug was fixed in the package libsoup2.4 - 2.74.3-10

---------------
libsoup2.4 (2.74.3-10) unstable; urgency=high

  [ Fabian Toepfer ]
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-2784-1.patch: Fix potential overflow
    - debian/patches/CVE-2025-2784-2.patch: Add better coverage of
      skip_insignificant_space()
    - CVE-2025-2784 (Closes: #1102208) (LP: #2107263)
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32050.patch: Fix using int instead of
      size_t for strcspn return
    - CVE-2025-32050 (Closes: #1102212)
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32052.patch: Fix heap buffer overflow in
      soup_content_sniffer_sniff
    - CVE-2025-32052 (Closes: #1102214)
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32053.patch: Fix heap buffer overflow in
      sniff_feed_or_html()
    - CVE-2025-32053 (Closes: #1102215)

 -- Jeremy Bícha <[email protected]>  Sat, 12 Apr 2025 15:15:11 -0400

** Changed in: libsoup2.4 (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-2784

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-32050

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-32052

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-32053

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2107263

Title:
  libsoup2.4 early April 2025 security vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsoup2.4/+bug/2107263/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to