Gnome

Libsoup

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 03.02.2026 20:12:21
  • Zuletzt bearbeitet 26.03.2026 18:02:05

A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerability arises from non-RFC-compliant parsing in the soup_filter_input_stream_read_line() logic, where libsoup accepts malformed chunk headers, such as lone...

  • EPSS 0.06%
  • Veröffentlicht 28.01.2026 15:15:48
  • Zuletzt bearbeitet 25.03.2026 14:08:59

A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization hea...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 28.01.2026 15:15:46
  • Zuletzt bearbeitet 25.03.2026 14:14:38

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 27.01.2026 09:17:44
  • Zuletzt bearbeitet 25.03.2026 14:20:18

A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header....

  • EPSS 0.07%
  • Veröffentlicht 23.10.2025 09:14:14
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal mess...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 03.04.2025 03:15:18
  • Zuletzt bearbeitet 18.11.2025 09:15:50

A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP serv...

  • EPSS 0.2%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 03.11.2025 23:17:15

GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 03.11.2025 23:17:15

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an applicati...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 03.11.2025 23:17:14

GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header...

  • EPSS 0.94%
  • Veröffentlicht 06.10.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:59

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.