Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <ff474a61-af6d-4849-b87a-9a7ac482663d@oracle.com>
Date: Sat, 9 Nov 2024 10:45:39 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: 4 recent security bugs in GNOME's libsoup

https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home lists four security
vulnerabilities reported against libsoup since June 2024, none of which have
CVE id's listed as being assigned.  (For those not familiar with it, libsoup is
an HTTP client/server library for the GNOME desktop.)

1) Request smuggling via stripping of null bytes from the ends of header names
    https://gitlab.gnome.org/GNOME/libsoup/-/issues/377

   "When Libsoup parses HTTP headers, it ignores null bytes at the ends of header
    names. Thus, 'Transfer-Encoding: chunked' is equivalent to
    'Transfer-Encoding\x00: chunked'. This allows for request smuggling when
    Libsoup is used in a service that's behind a reverse proxy that forwards
    null bytes without stripping them."

    This is marked as fixed in libsoup 3.6.0 (released August 25) by
    https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402 .

2) headers: Be more robust against invalid input when parsing params
    https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407

   "If you pass invalid input to a function such as
    soup_header_parse_param_list_strict() it can cause an overflow if it decodes
    the input to UTF-8.

    This should never happen with valid UTF-8 input which the API requires
    currently.

    This is not possible to happen with network data as all headers are decoded
    before this point."

    This is marked as fixed in the not-yet-released libsoup 3.6.1 by
    https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407

3) Infinite loop while reading websocket data
    https://gitlab.gnome.org/GNOME/libsoup/-/issues/391

    "Start a websocket server with libsoup and then run the following test case:
     stall.c" [attached to bug report at above URL]

    "libsoup will enter into a busy loop and use all the memory of the system
    until it crashes."

    This is marked as fixed in the not-yet-released libsoup 3.6.1 by
    https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410

4) https://gitlab.gnome.org/GNOME/libsoup/-/issues/390 is listed,
    but is not publicly visible yet, it has a disclosure date listed of
    November 19, 2024, and is marked as not yet fixed.

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.