There are 3 open security issues in bookworm.
3 issues left for the package maintainer to handle:
- CVE-2024-52530:
(needs triaging)
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
- CVE-2024-52531:
(needs triaging)
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.
- CVE-2024-52532:
(needs triaging)
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
You can find information about how to handle these issues in the security team's documentation.