libsoup-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libsoup-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • H
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-1.el8_2.4
  • H
Memory Leak

<0:2.62.3-1.el8_2.4
  • H
NULL Pointer Dereference

<0:2.62.3-1.el8_2.4
  • H
Free of Memory not on the Heap

<0:2.62.3-1.el8_2.4
  • H
Out-of-bounds Read

<0:2.62.3-1.el8_2.4
  • M
Improper Handling of Case Sensitivity

*
  • H
Memory Leak

<0:2.62.3-8.el8_10
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-8.el8_10
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • H
Free of Memory not on the Heap

<0:2.62.3-8.el8_10
  • M
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:2.62.3-8.el8_10
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:2.62.3-8.el8_10
  • H
Buffer Over-read

<0:2.62.3-8.el8_10
  • H
Buffer Under-read

<0:2.62.3-8.el8_10
  • H
Buffer Over-read

<0:2.62.3-8.el8_10
  • M
Out-of-bounds Read

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.62.3-6.el8_10
  • H
HTTP Request Smuggling

<0:2.62.3-6.el8_10
  • H
Heap-based Buffer Overflow

<0:2.62.3-7.el8_10
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-1.el8_2.1