<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/poky.git/meta/recipes-support/libsoup/libsoup-2.4/0001-CVE-2025-32911.patch, branch master</title>
<subtitle>Mirror of git.yoctoproject.org/poky</subtitle>
<id>https://git.enea.com/cgit/linux/poky.git/atom?h=master</id>
<link rel='self' href='https://git.enea.com/cgit/linux/poky.git/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/'/>
<updated>2025-05-15T09:55:26+00:00</updated>
<entry>
<title>libsoup-2.4: Drop recipe as obsolete</title>
<updated>2025-05-15T09:55:26+00:00</updated>
<author>
<name>Richard Purdie</name>
<email>richard.purdie@linuxfoundation.org</email>
</author>
<published>2025-05-13T12:43:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=09c768e203ea49307137bd59fd14c865d48d988f'/>
<id>urn:sha1:09c768e203ea49307137bd59fd14c865d48d988f</id>
<content type='text'>
The last user in OE-Core was gst-examples. This has been upgraded and the dependency
dropped, all other users can use libsoup3 instead. Therefore remove the obsolete and
deprecated version.

(From OE-Core rev: 94ebc5b798aed6eea642c5e2a4df24b386520636)

Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>libsoup-2.4: fix CVE-2025-32911</title>
<updated>2025-05-01T13:22:54+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2025-04-30T07:50:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=e5902fa07b5d4874533e5a87ebbe9d4b0e66c3c0'/>
<id>urn:sha1:e5902fa07b5d4874533e5a87ebbe9d4b0e66c3c0</id>
<content type='text'>
CVE-2025-32911:
A use-after-free type vulnerability was found in libsoup, in the
soup_message_headers_get_content_disposition() function. This flaw
allows a malicious HTTP client to cause memory corruption in the libsoup
server.

Backport patches to fix it

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-32911
[2] https://gitlab.gnome.org/GNOME/libsoup/-/issues/433

(From OE-Core rev: 839d93bbb1ca7a51b659b8cb9def9b354a99518f)

Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
</feed>
