Описание
Rejected reason: Maintainers have included reasons at https://gitlab.gnome.org/GNOME/libsoup/-/issues/465
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected | |
focal | ignored | end of standard support, was needs-triage |
jammy | not-affected | |
noble | not-affected | |
plucky | not-affected | |
upstream | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/jammy | not-affected | |
jammy | not-affected | |
noble | not-affected | |
plucky | not-affected | |
upstream | needs-triage |
Показывать по
Связанные уязвимости
A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does not validate the `name` parameter passed in, and directly accesses `soup_header_name_strings[name]`. The value of `name` is controllable, when `name` exceeds the index range of `soup_headr_name_string`, it will cause an out-of-bounds access.
Rejected reason: Maintainers have included reasons at https://gitlab.gnome.org/GNOME/libsoup/-/issues/465
A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does not validate the `name` parameter passed in, and directly accesses `soup_header_name_strings[name]`. The value of `name` is controllable, when `name` exceeds the index range of `soup_headr_name_string`, it will cause an out-of-bounds access.