CVE-2025-2784
03.04.2025, 03:15
A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.Enginsight
Vendor | Product | Version |
---|---|---|
gnome | libsoup | 𝑥 < 3.6.5 |
redhat | codeready_linux_builder | 10.0 |
redhat | codeready_linux_builder_for_arm64 | 10.0_aarch64:_aarch64 |
redhat | codeready_linux_builder_for_arm64_eus | 10.0_aarch64:_aarch64 |
redhat | codeready_linux_builder_for_ibm_z_systems | 10.0_s390x:_s390x |
redhat | codeready_linux_builder_for_ibm_z_systems_eus | 10.0_s390x:_s390x |
redhat | codeready_linux_builder_for_power_little_endian | 10.0_ppc64le:_ppc64le |
redhat | codeready_linux_builder_for_power_little_endian_eus | 10.0_ppc64le:_ppc64le |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 9.0 |
redhat | enterprise_linux | 10.0 |
redhat | enterprise_linux_eus | 8.8 |
redhat | enterprise_linux_eus | 9.2 |
redhat | enterprise_linux_eus | 9.4 |
redhat | enterprise_linux_eus | 9.6 |
redhat | enterprise_linux_eus | 10.0 |
redhat | enterprise_linux_for_arm_64 | 8.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64 | 9.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64 | 10.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.8_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 9.2_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 9.4_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 9.6_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 10.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_ibm_z_systems | 8.0_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems | 9.0_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems | 10.0_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.8_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 9.2_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 9.4_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 9.6_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 10.0_s390x:_s390x |
redhat | enterprise_linux_for_power_little_endian | 8.0_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian | 9.0_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian | 10.0_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.8_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 9.2_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 9.4_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 9.6_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 10.0_ppc64le:_ppc64le |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_aus | 8.4 |
redhat | enterprise_linux_server_aus | 8.6 |
redhat | enterprise_linux_server_aus | 9.2 |
redhat | enterprise_linux_server_aus | 9.4 |
redhat | enterprise_linux_server_aus | 9.6 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.6_ppc64le:_ppc64le |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.0_ppc64le:_ppc64le |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.6_ppc64le:_ppc64le |
redhat | enterprise_linux_server_tus | 8.6 |
redhat | enterprise_linux_server_tus | 8.8 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.8 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.0 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.2 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.4 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References