Change log for libsoup3 package in Ubuntu

150 of 53 results
Published in resolute-release
Published in questing-release
Deleted in questing-proposed (Reason: Moved to questing)
libsoup3 (3.6.5-4) unstable; urgency=medium

  * Team upload
  * d/p/tests-Gracefully-skip-test-if-a-large-memory-allocation-f.patch:
    Add patch to fix a test failure on some 32-bit machines
  * Build-depend on gobject-introspection instead of
    libgirepository1.0-dev
  * Standards-Version: 4.7.2 (no changes required)

 -- Simon McVittie <email address hidden>  Wed, 27 Aug 2025 09:25:32 +0100

Available diffs

Superseded in questing-release
Deleted in questing-proposed (Reason: Moved to questing)
libsoup3 (3.6.5-3) unstable; urgency=medium

  * Team upload
  * d/p/soup-init-Use-libdl-instead-of-gmodule-in-soup2_is_loaded.patch:
    Fix a deadlock in some use patterns with dlopen and GModule.
    If earlier versions of libsoup were dlopen'd (without using GModule)
    in thread A, while thread B is holding the GModule lock but not the
    libdl lock, the process would deadlock: in this scenario, thread A
    is holding the libdl lock and attempts to take the GModule lock,
    while thread B is holding the GModule lock and attempts to take the
    libdl lock.
    For example, this is known to affect some mopidy plugins, which load
    libsoup via souphttpsrc.
    Avoid this by making the check for libsoup2 symbols call dlopen
    directly, so that there is no lock ordering inconsistency.
    (Closes: #1109685)

 -- Simon McVittie <email address hidden>  Thu, 24 Jul 2025 10:40:02 +0100
Published in noble-updates
Published in noble-security
libsoup3 (3.4.4-5ubuntu0.5) noble-security; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32907-*.patch: Add i-- in
      libsoup/soup-message-headers.c. Add B_SANITIZE_OPTION to meson.build.
    - debian/patches/CVE-2025-4948.patch: Add ternary end - 2 - split check in
      libsoup/soup-multipart.c.
    - CVE-2025-32907
    - CVE-2025-4948
  * SECURITY UPDATE: Out of bounds read.
    - debian/patches/CVE-2025-4969.patch: Add extra if checks for start of line
      in libsoup/soup-multipart.c.
    - CVE-2025-4969
  * SECURITY UPDATE: Improper validation of cookie expiration.
    - debian/patches/CVE-2025-4945-*.patch: Add extra date checks in
      libsoup/soup-date-utils.c.
    - CVE-2025-4945

 -- Hlib Korzhynskyy <email address hidden>  Mon, 14 Jul 2025 16:35:26 -0230
Published in plucky-updates
Published in plucky-security
libsoup3 (3.6.5-1ubuntu0.2) plucky-security; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32907-*.patch: Add i-- in
      libsoup/soup-message-headers.c. Add B_SANITIZE_OPTION to meson.build.
    - debian/patches/CVE-2025-4948.patch: Add ternary end - 2 - split check in
      libsoup/soup-multipart.c.
    - CVE-2025-32907
    - CVE-2025-4948
  * SECURITY UPDATE: Out of bounds read.
    - debian/patches/CVE-2025-32914.patch: Replace strstr operation with
      g_strstr_len in ./libsoup/soup-multipart.c.
    - debian/patches/CVE-2025-4969.patch: Add extra if checks for start of line
      in libsoup/soup-multipart.c.
    - CVE-2025-32914
    - CVE-2025-4969
  * SECURITY UPDATE: Improper validation of cookie expiration.
    - debian/patches/CVE-2025-4945-*.patch: Add extra date checks in
      libsoup/soup-date-utils.c.
    - CVE-2025-4945

 -- Hlib Korzhynskyy <email address hidden>  Wed, 09 Jul 2025 17:13:07 -0230
Superseded in questing-proposed
libsoup3 (3.6.5-2) unstable; urgency=medium

  * Team upload
  * d/patches: Re-export patch series (no functional changes)
  * d/p/multipart-Fix-read-out-of-buffer-bounds-under-soup_multip.patch:
    Add patch from upstream git to fix multipart message parsing.
    Previously this could read outside the buffer.
    This change isn't on upstream's 3.6.x branch yet, so take it from
    3.7.x. Test coverage is included.
    (CVE-2025-32914, Closes: #1103267)
  * d/p/soup-server-http2-Check-validity-of-the-constructed-conne.patch,
    d/p/soup-server-http2-Correct-check-of-the-validity-of-the-co.patch:
    Add patch from upstream git to fix denial of service in HTTP/2 server.
    The original change does not seem to have been fully correct; a
    follow-up fix for it is also included.
    (CVE-2025-32908, Closes: #1103265)
  * d/p/auth-digest-fix-crash-in-soup_auth_digest_get_protection_.patch:
    Add patch from upstream git to fix denial of service (a crash)
    if a libsoup client is connected to a malicious server.
    (CVE-2025-4476, Closes: #1105887)
  * d/p/soup-message-headers-Correct-merge-of-ranges.patch,
    d/p/server-mem-limit-test-Limit-memory-usage-only-when-not-bu.patch:
    Add patch from upstream git fixing server-side DoS in Range requests,
    with a follow-up patch to make the newly added test work when compiled
    with AddressSanitizer.
    (CVE-2025-32907, Closes: #1103264)
  * d/p/soup-multipart-Verify-boundary-limits-for-multipart-body.patch:
    Add patch from upstream git fixing denial of service with crafted
    multipart body.
    (CVE-2025-4948, Closes: #1106204)
  * d/p/soup-multipart-Verify-array-bounds-before-accessing-its-m.patch:
    Add patch from upstream git fixing another denial of service with
    crafted multipart body.
    (CVE-2025-4969, Closes: #1106248)
  * d/p/soup-date-utils-Add-value-checks-for-date-time-parsing.patch,
    d/p/tests-Add-tests-for-date-time-including-timezone-validati.patch:
    Add patch from upstream git fixing date/time validation, and expand
    test coverage for this area.
    (CVE-2025-4945, Closes: #1106205)
  * d/p/soup-form-Fix-a-possible-memory-leak-in-soup_form_decode_.patch:
    Add patch from upstream git fixing some memory leaks
  * d/p/websocket-test-Fix-two-memory-leaks.patch,
    d/p/misc-test-Fix-two-memory-leaks.patch,
    d/p/http2-test-Fix-several-memory-leaks.patch,
    d/p/range-test-Fix-a-memory-leak.patch:
    Add patches from upstream git fixing some memory leaks in tests.
    These are certainly not denial-of-service issues, but it makes "real"
    memory leaks harder to detect if there are benign memory leaks in
    the test code.
  * d/p/test-utils-flush-stdout-after-printing.patch:
    Add patch from upstream git to improve test logging.
    This does not change production code, and should make it somewhat
    less difficult to diagnose the root cause of test failures.
    (Maybe helps: #1035983, #1109107, #1109108, #1109120)
  * d/p/test-utils-fix-deadlock-in-add_listener_in_thread.patch:
    Add patch from upstream git to fix a deadlock during testing.
    This hopefully addresses one of the many sources of low-probability test
    failures that add up to a noticeable probability of the test suite
    as a whole failing (see also #1035983). (Closes: #1109120)
  * d/p/tests-Treat-multithread-test-as-an-Apache-test.patch:
    Add patch to treat multithread-test like other Apache-based tests,
    so that it will not be run in parallel with others.
    (Maybe helps: #1035983)
  * d/rules: Capture test output into the buildd log, even if successful.
    If we don't have the output from successful test logs, it's more
    difficult to assess whether workarounds have helped, because we won't
    see whether the situation needing the workaround was ever triggered.
  * d/p/debian/docs-Remove-remotely-accessed-logo.patch:
    Remove remote logo references from local documentation, improving privacy
    and fixing a Lintian warning

 -- Simon McVittie <email address hidden>  Sat, 12 Jul 2025 09:52:52 +0100
Superseded in questing-release
Deleted in questing-proposed (Reason: Moved to questing)
libsoup3 (3.6.5-1ubuntu1) questing; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32908-1.patch: Add NULL checks with returns for
      NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-32908-2.patch: Improve NULL checks in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-4476.patch: Replace strcmp with g_strcmp0 in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32908
    - CVE-2025-4476

 -- Hlib Korzhynskyy <email address hidden>  Thu, 22 May 2025 15:04:22 -0230
Superseded in noble-updates
Superseded in noble-security
libsoup3 (3.4.4-5ubuntu0.4) noble-security; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32908-1.patch: Add NULL checks with returns for
      NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-32908-2.patch: Improve NULL checks in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-4476.patch: Replace strcmp with g_strcmp0 in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32908
    - CVE-2025-4476

 -- Hlib Korzhynskyy <email address hidden>  Thu, 22 May 2025 15:14:07 -0230
Published in oracular-updates
Published in oracular-security
libsoup3 (3.6.0-2ubuntu0.4) oracular-security; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32908-1.patch: Add NULL checks with returns for
      NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-32908-2.patch: Improve NULL checks in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-4476.patch: Replace strcmp with g_strcmp0 in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32908
    - CVE-2025-4476

 -- Hlib Korzhynskyy <email address hidden>  Thu, 22 May 2025 11:54:06 -0230
Superseded in plucky-updates
Superseded in plucky-security
libsoup3 (3.6.5-1ubuntu0.1) plucky-security; urgency=medium

  * SECURITY UPDATE: Denial of service.
    - debian/patches/CVE-2025-32908-1.patch: Add NULL checks with returns for
      NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-32908-2.patch: Improve NULL checks in
      ./libsoup/server/http2/soup-server-message-io-http2.c.
    - debian/patches/CVE-2025-4476.patch: Replace strcmp with g_strcmp0 in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32908
    - CVE-2025-4476

 -- Hlib Korzhynskyy <email address hidden>  Thu, 22 May 2025 14:37:50 -0230
Superseded in noble-updates
Superseded in noble-security
libsoup3 (3.4.4-5ubuntu0.3) noble-security; urgency=medium

  * SECURITY UPDATE: Out of bound read.
    - debian/patches/CVE-2025-32906-*.patch: Add out of bound checks in
      soup_headers_parse_request in ./libsoup/soup-headers.c.
    - debian/patches/CVE-2025-32914.patch: Replace strstr operation with
      g_strstr_len in ./libsoup/soup-multipart.c.
    - CVE-2025-32906
    - CVE-2025-32914
  * SECURITY UPDATE: Null pointer dereference.
    - debian/patches/CVE-2025-32909.patch: Add resource size check in
      ./libsoup/content-sniffer/soup-content-sniffer.c.
    - debian/patches/CVE-2025-32910-32912-*.patch: Add checks for missing realm
      and nonce, and fix memory leak in ./libsoup/auth/soup-auth-digest.c.
    - debian/patches/CVE-2025-32912-*.patch: Add additional checks for nonce in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32909
    - CVE-2025-32910
    - CVE-2025-32912
  * SECURITY UPDATE: Memory corruption.
    - debian/patches/CVE-2025-32911-32913-*.patch: Add checks for empty
      filename in ./libsoup/soup-message-headers.c.
    - CVE-2025-32911
    - CVE-2025-32913
  * SECURITY UPDATE: Memory leak.
    - debian/patches/CVE-2025-46420.patch: Free allocated strings during
      iteration in ./libsoup/soup-headers.c.
    - CVE-2025-46420
  * SECURITY UPDATE: Information exposure through host impersonation.
    - debian/patches/CVE-2025-46421.patch: Strip credentials on cross-origin
      redirects in ./libsoup/soup-session.c.
    - CVE-2025-46421

 -- Hlib Korzhynskyy <email address hidden>  Wed, 30 Apr 2025 16:32:01 -0230
Superseded in oracular-updates
Superseded in oracular-security
libsoup3 (3.6.0-2ubuntu0.3) oracular-security; urgency=medium

  * SECURITY UPDATE: Out of bound read.
    - debian/patches/CVE-2025-32906-*.patch: Add out of bound checks in
      soup_headers_parse_request in ./libsoup/soup-headers.c.
    - debian/patches/CVE-2025-32914.patch: Replace strstr operation with
      g_strstr_len in ./libsoup/soup-multipart.c.
    - CVE-2025-32906
    - CVE-2025-32914
  * SECURITY UPDATE: Null pointer dereference.
    - debian/patches/CVE-2025-32909.patch: Add resource size check in
      ./libsoup/content-sniffer/soup-content-sniffer.c.
    - debian/patches/CVE-2025-32910-32912-*.patch: Add checks for missing realm
      and nonce, and fix memory leak in ./libsoup/auth/soup-auth-digest.c.
    - debian/patches/CVE-2025-32912-*.patch: Add additional checks for nonce in
      ./libsoup/auth/soup-auth-digest.c.
    - CVE-2025-32909
    - CVE-2025-32910
    - CVE-2025-32912
  * SECURITY UPDATE: Memory corruption.
    - debian/patches/CVE-2025-32911-32913-*.patch: Add checks for empty
      filename in ./libsoup/soup-message-headers.c.
    - CVE-2025-32911
    - CVE-2025-32913
  * SECURITY UPDATE: Memory leak.
    - debian/patches/CVE-2025-46420.patch: Free allocated strings during
      iteration in ./libsoup/soup-headers.c.
    - CVE-2025-46420
  * SECURITY UPDATE: Information exposure through host impersonation.
    - debian/patches/CVE-2025-46421.patch: Strip credentials on cross-origin
      redirects in ./libsoup/soup-session.c.
    - CVE-2025-46421

 -- Hlib Korzhynskyy <email address hidden>  Thu, 01 May 2025 17:05:42 -0230
Superseded in noble-updates
Superseded in noble-security
libsoup3 (3.4.4-5ubuntu0.2) noble-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-2784-1.patch: Fix potential overflow
    - debian/patches/CVE-2025-2784-2.patch: Add better coverage of
      skip_insignificant_space()
    - CVE-2025-2784
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32050.patch: Fix using int instead of
      size_t for strcspn return
    - CVE-2025-32050
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2025-32051-1.patch: Fix possible NULL deref in
      soup_uri_decode_data_uri
    - debian/patches/CVE-2025-32051-2.patch: Handle URIs with a path
      starting with //
    - CVE-2025-32051
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32052.patch: Fix heap buffer overflow in
      soup_content_sniffer_sniff
    - CVE-2025-32052
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32053.patch: Fix heap buffer overflow in
      sniff_feed_or_html()
    - CVE-2025-32053

 -- Fabian Toepfer <email address hidden>  Wed, 09 Apr 2025 14:47:38 +0200
Superseded in oracular-updates
Superseded in oracular-security
libsoup3 (3.6.0-2ubuntu0.2) oracular-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-2784-1.patch: Fix potential overflow
    - debian/patches/CVE-2025-2784-2.patch: Add better coverage of
      skip_insignificant_space()
    - CVE-2025-2784
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32050.patch: Fix using int instead of
      size_t for strcspn return
    - CVE-2025-32050
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2025-32051-1.patch: Fix possible NULL deref in
      soup_uri_decode_data_uri
    - debian/patches/CVE-2025-32051-2.patch: Handle URIs with a path
      starting with //
    - CVE-2025-32051
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32052.patch: Fix heap buffer overflow in
      soup_content_sniffer_sniff
    - CVE-2025-32052
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2025-32053.patch: Fix heap buffer overflow in
      sniff_feed_or_html()
    - CVE-2025-32053

 -- Fabian Toepfer <email address hidden>  Wed, 09 Apr 2025 19:07:25 +0200
Superseded in questing-release
Published in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.5-1) unstable; urgency=high

  * New upstream release
  * libsoup-3.0-dev: Add Depends: libkrb5-dev
  * Remove libsoup.gnome.org patch: applied in new release
  * Update Homepage

 -- Jeremy Bícha <email address hidden>  Fri, 21 Mar 2025 17:04:16 -0400

Available diffs

Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.4-3) unstable; urgency=medium

  * Team upload
  * d/p/Replace-remaining-references-to-libsoup.org-with-libsoup..patch:
    Add proposed patch to replace expired upstream domain name with
    libsoup.gnome.org

 -- Simon McVittie <email address hidden>  Wed, 19 Mar 2025 14:13:56 +0000

Available diffs

Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.4-2) unstable; urgency=medium

  [ Aurelien Jarno ]
  * Increase build test timeout, for riscv64 (Closes: #1093564)

  [ Jeremy Bícha ]
  * Run wrap-and-sort

 -- Jeremy Bícha <email address hidden>  Wed, 22 Jan 2025 13:23:32 -0500

Available diffs

Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.4-1) unstable; urgency=medium

  * New upstream release

 -- Jeremy Bícha <email address hidden>  Thu, 16 Jan 2025 17:58:00 -0500

Available diffs

Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.1-1) unstable; urgency=medium

  * New upstream release
  * Remove 6 patches applies in new release

 -- Jeremy Bícha <email address hidden>  Mon, 25 Nov 2024 09:06:51 -0500

Available diffs

Superseded in oracular-updates
Superseded in oracular-security
libsoup3 (3.6.0-2ubuntu0.1) oracular-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2024-52531-1.patch: Be more robust against
      invalid input when parsing params
    - debian/patches/CVE-2024-52531-2.patch: Add test for passing
      invalid UTF-8 to soup_header_parse_semi_param_list()
    - CVE-2024-52531
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-52532-1.patch: process the frame as soon
      as data is read
    - debian/patches/CVE-2024-52532-2.patch: disconnect error copy
      after the test ends
    - CVE-2024-52532

 -- Bruce Cable <email address hidden>  Mon, 18 Nov 2024 15:21:41 +1100
Superseded in noble-updates
Superseded in noble-security
libsoup3 (3.4.4-5ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: Request smuggling
    - debian/patches/CVE-2024-52530.patch: Strictly don't allow NUL
      bytes in headers
    - CVE-2024-52530
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2024-52531-1.patch: Be more robust against
      invalid input when parsing params
    - debian/patches/CVE-2024-52531-2.patch: Add test for passing
      invalid UTF-8 to soup_header_parse_semi_param_list()
    - CVE-2024-52531
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-52532-1.patch: process the frame as soon
      as data is read
    - debian/patches/CVE-2024-52532-2.patch: disconnect error copy
      after the test ends
    - CVE-2024-52532

 -- Bruce Cable <email address hidden>  Mon, 18 Nov 2024 15:21:40 +1100
Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.0-4) unstable; urgency=medium

  * d/patches: Add bug fixes from upstream
    - d/p/server-Add-note-about-recommended-usage.patch:
      Document the level of security support for the server side.
      Upstream has clarified the documentation to state that SoupServer
      is not intended to be exposed to untrusted clients.
      (Related to CVE-2024-52531, CVE-2024-52532)
    - d/p/headers-Be-more-robust-against-invalid-input-when-parsing.patch:
      Fix a buffer overrun if asked to parse non-UTF-8 headers. It is
      believed that this cannot happen on the client side, but it can
      happen in SoupServer. (CVE-2024-52531, Closes: #1087417)
    - d/p/tests-Add-test-for-passing-invalid-UTF-8-to-soup_header_p.patch:
      Add a test-case for the above
    - d/p/websocket-process-the-frame-as-soon-as-we-read-data.patch:
      Avoid an infinite loop in WebSocket processing
      (CVE-2024-52532, Closes: #1087416)
    - d/p/websocket-test-disconnect-error-copy-after-the-test-ends.patch:
      Fix a test failure after resolving CVE-2024-52532
  * d/p/websocket-test-Disconnect-error-signal-in-another-place.patch:
    Add proposed patch to fix another intermittent test failure after
    resolving CVE-2024-52532
  * d/control: libsoup-3.0-tests Depends on ca-certificates.
    Related to #1054962, #1064744
  * d/libsoup-3.0-doc.links: Register reference manual with devhelp
  * d/libsoup-3.0-doc.links: Create symlinks in
    /usr/share/doc/libsoup-3.0-{dev,doc} to make the HTML documentation
    more discoverable

 -- Simon McVittie <email address hidden>  Wed, 13 Nov 2024 14:50:50 +0000

Available diffs

Superseded in plucky-release
Deleted in plucky-proposed (Reason: Moved to plucky)
libsoup3 (3.6.0-3) unstable; urgency=medium

  * Add Build-Depends: ca-certificates for build tests
    (Closes: #1064744, #1054962)
  * Update Homepage

 -- Jeremy Bícha <email address hidden>  Thu, 31 Oct 2024 11:05:08 +0100

Available diffs

Superseded in plucky-release
Published in oracular-release
Deleted in oracular-proposed (Reason: Moved to oracular)
libsoup3 (3.6.0-2) unstable; urgency=medium

  [ Helmut Grohne ]
  * Remove unused python3 & python3-quart dependencies (Closes: #1080044)

 -- Jeremy Bícha <email address hidden>  Sat, 31 Aug 2024 08:30:58 -0400

Available diffs

Superseded in oracular-release
Deleted in oracular-proposed (Reason: Moved to oracular)
libsoup3 (3.6.0-1) unstable; urgency=medium

  * New upstream release
  * Remove 3 patches applied in new release

 -- Jeremy Bícha <email address hidden>  Mon, 26 Aug 2024 06:57:51 -0400

Available diffs

Superseded in oracular-release
Deleted in oracular-proposed (Reason: Moved to oracular)
libsoup3 (3.5.2-1) unstable; urgency=medium

  * New upstream release
  * debian/libsoup-3.0-0.symbols: Add new symbols
  * Bump minimum glib
  * Fix nocheck build
  * Cherry-pick some additional fixes
  * Bump Standards Version to 4.7.0

 -- Jeremy Bícha <email address hidden>  Fri, 09 Aug 2024 18:27:30 -0400
Superseded in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-5build2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 02:17:22 +0000

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-5build1) noble; urgency=medium

  * No-change rebuild against libglib2.0-0t64

 -- Steve Langasek <email address hidden>  Fri, 08 Mar 2024 05:29:46 +0000
Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-5) unstable; urgency=medium

  * Don't require libapache2-mod-php on i386 either

 -- Jeremy Bícha <email address hidden>  Sun, 28 Jan 2024 20:05:48 -0500

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-4) unstable; urgency=medium

  * Don't require php on i386: only used by tests

 -- Jeremy Bícha <email address hidden>  Sun, 28 Jan 2024 08:50:22 -0500

Available diffs

Superseded in noble-proposed
libsoup3 (3.4.4-3) unstable; urgency=medium

  [ Simon McVittie ]
  * d/rules: Explicitly disable pkcs11_tests if built with nocheck,noinsttest.
    These require GNUTLS, which is omitted from the build dependencies
    if built with both of those profiles. Because we're using
    -Dauto_features=enabled, we need to override that for each feature that
    is not wanted.
    Note that both of those profiles need to be activated during
    bootstrapping: even if we are not going to run the test suite during
    the build, we need to compile it for the libsoup3.0-tests binary package,
    unless the noinsttest build profile was specified. (Closes: #1061133)

 -- Jeremy Bícha <email address hidden>  Fri, 19 Jan 2024 09:06:45 -0500

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-2) unstable; urgency=medium

  * Team upload
  * d/control: Stop generating from d/control.in
  * d/control: Explicitly build-depend on required GIR XML.
    Helps: #1030223
  * d/control: Add ${gir:Depends}, ${gir:Provides} to -dev package.
    Helps: #1030223
  * Remove version constraints unnecessary since Debian 11

 -- Simon McVittie <email address hidden>  Fri, 17 Nov 2023 13:28:30 +0000

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsoup3 (3.4.4-1) unstable; urgency=medium

  * New upstream release
    - Fix regression seen in Ubuntu's s390s autopkgtest (LP: #2036444)

 -- Jeremy Bícha <email address hidden>  Thu, 26 Oct 2023 20:24:22 -0400

Available diffs

Superseded in noble-proposed
Deleted in mantic-proposed (Reason: mantic->noble)
libsoup3 (3.4.3-1) unstable; urgency=medium

  * New upstream release

 -- Jeremy Bícha <email address hidden>  Fri, 15 Sep 2023 14:09:13 -0400

Available diffs

Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsoup3 (3.4.2-4) unstable; urgency=medium

  * Revert "d/rules, d/meson/no-exe-wrapper.ini: Work around FTBFS on mips64el":
    The underlying issue was fixed in meson 1.2.1
  * Have -dev package depend on libsysprof-capture-4-dev instead of
    libsysprof-4-dev

 -- Jeremy Bícha <email address hidden>  Thu, 10 Aug 2023 09:55:02 -0400

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsoup3 (3.4.2-3) unstable; urgency=medium

  * d/rules, d/meson/no-exe-wrapper.ini: Work around FTBFS on mips64el
    Mitigates: #1041499

 -- Jeremy Bícha <email address hidden>  Fri, 04 Aug 2023 11:37:09 -0400

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsoup3 (3.4.2-2) unstable; urgency=medium

  * Release to unstable

 -- Jeremy Bícha <email address hidden>  Sun, 23 Jul 2023 15:55:23 -0400

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsoup3 (3.4.2-1) experimental; urgency=medium

  * New upstream release
  * Update lintian override info format
  * Update standards version to 4.6.2, no changes needed

 -- Jeremy Bícha <email address hidden>  Sun, 07 May 2023 10:46:02 -0400

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsoup3 (3.4.1-1) experimental; urgency=medium

  * New upstream release
  * Drop patch applied in new release

 -- Jeremy Bicha <email address hidden>  Fri, 21 Apr 2023 10:56:33 +0200

Available diffs

Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsoup3 (3.4.0-1) experimental; urgency=medium

  * New upstream release
  * Cherry-pick fix for build on various architectures

 -- Jeremy Bicha <email address hidden>  Sun, 19 Mar 2023 18:12:58 -0400

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsoup3 (3.2.2-1) unstable; urgency=medium

  * New upstream release
  * Drop cherry-picked 32-bit patches: applied in new release

 -- Jeremy Bicha <email address hidden>  Wed, 30 Nov 2022 15:11:19 -0500

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsoup3 (3.2.1-2) unstable; urgency=medium

  * Cherry-pick patches to fix 32-bit build

 -- Jeremy Bicha <email address hidden>  Fri, 21 Oct 2022 14:09:33 -0400

Available diffs

Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.2.0-1) unstable; urgency=medium

  * New upstream release

 -- Jeremy Bicha <email address hidden>  Wed, 14 Sep 2022 16:04:35 -0400

Available diffs

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.1.4-1) unstable; urgency=medium

  [ Jeremy Bicha ]
  * New upstream release

  [ Eric Long ]
  * Add patch to fix build test timeout on riscv64 (Closes: #1018709)

 -- Jeremy Bicha <email address hidden>  Fri, 02 Sep 2022 16:23:08 -0400

Available diffs

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.1.3-2) unstable; urgency=medium

  [ Samuel Thibault ]
  * Fix unsatisfiable dependency on non-Linux (Closes: #1017758)

 -- Jeremy Bicha <email address hidden>  Sun, 21 Aug 2022 16:23:16 -0400

Available diffs

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.1.3-1) unstable; urgency=medium

  * Team upload
  * New upstream release

 -- Jesús Soto <email address hidden>  Tue, 16 Aug 2022 14:23:55 -0500

Available diffs

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.1.1-1) unstable; urgency=medium

  * New upstream release
  * Refresh patch
  * Build-Depend on gi-docgen instead of gtk-doc-tools
  * debian/libsoup-3.0-0.symbols: Add new symbols

 -- Jeremy Bicha <email address hidden>  Wed, 03 Aug 2022 08:20:06 -0400

Available diffs

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.0.7-1) unstable; urgency=medium

  * New upstream release (LP: #1980400)
  * debian/libsoup-3.0-0.symbols: Drop 2 unused symbols no longer exported

 -- Jeremy Bicha <email address hidden>  Thu, 30 Jun 2022 15:10:11 -0400

Available diffs

Published in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
libsoup3 (3.0.7-0ubuntu1) jammy; urgency=medium

  * New upstream release (LP: #1980400)
  * debian/libsoup-3.0-0.symbols: Drop 2 unused symbols no longer exported

 -- Jeremy Bicha <email address hidden>  Thu, 30 Jun 2022 15:10:11 -0400
Superseded in kinetic-release
Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libsoup3 (3.0.6-1) unstable; urgency=medium

  * New upstream release
  * debian/control.in: Bump minimum meson to 0.54

 -- Jeremy Bicha <email address hidden>  Thu, 31 Mar 2022 16:47:01 -0400

Available diffs

Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libsoup3 (3.0.5-1) unstable; urgency=medium

  * New upstream release
  * Drop test patches applied in new release

 -- Jeremy Bicha <email address hidden>  Fri, 18 Mar 2022 14:47:42 -0400

Available diffs

150 of 53 results