Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-8197

Опубликовано: 25 июл. 2025
Источник: ubuntu
Приоритет: medium

Описание

Rejected reason: Maintainers have included reasons at https://gitlab.gnome.org/GNOME/libsoup/-/issues/465

РелизСтатусПримечание
devel

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

focal

ignored

end of standard support, was needs-triage
jammy

not-affected

noble

not-affected

plucky

not-affected

upstream

needed

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-apps/jammy

not-affected

jammy

not-affected

noble

not-affected

plucky

not-affected

upstream

needs-triage

Показывать по

Связанные уязвимости

CVSS3: 5.5
redhat
3 месяца назад

A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does not validate the `name` parameter passed in, and directly accesses `soup_header_name_strings[name]`. The value of `name` is controllable, when `name` exceeds the index range of `soup_headr_name_string`, it will cause an out-of-bounds access.

nvd
3 месяца назад

Rejected reason: Maintainers have included reasons at https://gitlab.gnome.org/GNOME/libsoup/-/issues/465

CVSS3: 5.5
github
3 месяца назад

A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does not validate the `name` parameter passed in, and directly accesses `soup_header_name_strings[name]`. The value of `name` is controllable, when `name` exceeds the index range of `soup_headr_name_string`, it will cause an out-of-bounds access.