Gnome Libsoup vulnerabilities

11 known vulnerabilities affecting gnome/libsoup.

Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH3MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2025-12105HIGHCVSS 7.5≤ 3.6.52025-10-23
CVE-2025-12105 [HIGH] CWE-416 CVE-2025-12105: A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by G A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free
cvelistv5nvd
CVE-2025-2784MEDIUMCVSS 6.5fixed in 3.6.52025-04-03
CVE-2025-2784 [HIGH] CWE-125 CVE-2025-2784: A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing cont A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.
nvd
CVE-2024-52532HIGHCVSS 7.5fixed in 3.6.12024-11-11
CVE-2024-52532 [HIGH] CWE-835 CVE-2024-52532: GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certa GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
nvd
CVE-2024-52530HIGHCVSS 7.5fixed in 3.6.02024-11-11
CVE-2024-52530 [HIGH] CWE-444 CVE-2024-52530: GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' charact GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
nvd
CVE-2024-52531MEDIUMCVSS 6.5fixed in 3.6.12024-11-11
CVE-2024-52531 [MEDIUM] CWE-787 CVE-2024-52531: GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
cvelistv5nvd
CVE-2019-17266CRITICALCVSS 9.8≥ 2.65.1, < 2.66.4≥ 2.67.1, ≤ 2.68.12019-10-06
CVE-2019-17266 [CRITICAL] CWE-125 CVE-2019-17266: libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
nvd
CVE-2018-12910CRITICALCVSS 9.8v2.63.22018-07-05
CVE-2018-12910 [CRITICAL] CWE-125 CVE-2018-12910: The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
nvd
CVE-2018-11713MEDIUMCVSS 6.5fixed in 2.62.02018-06-04
CVE-2018-11713 [MEDIUM] CVE-2018-11713: WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKi WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
nvd
CVE-2017-2885CRITICALCVSS 9.8v2.582018-04-24
CVE-2017-2885 [CRITICAL] CWE-787 CVE-2017-2885: An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A special An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
cvelistv5nvd
CVE-2012-2132MEDIUMCVSS 5.0v2.32.22012-08-20
CVE-2012-2132 [MEDIUM] CWE-287 CVE-2012-2132: libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-fi libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
nvd
CVE-2011-2524MEDIUMCVSS 5.0≤ 2.35.3v2.0+72 more2011-08-31
CVE-2011-2524 [MEDIUM] CWE-22 CVE-2011-2524: Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
nvd