First published: Mon Nov 11 2024(Updated: )
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libraries | <3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2325277 is classified as a buffer overflow vulnerability.
To fix REDHAT-BUG-2325277, update GNOME libsoup to version 3.6.1 or later.
REDHAT-BUG-2325277 can lead to potential crashes of applications that use the affected libsoup version.
No, REDHAT-BUG-2325277 cannot be triggered by input received over the network.
GNOME libsoup versions prior to 3.6.1 are affected by REDHAT-BUG-2325277.