libsoup-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libsoup-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
HTTP Request Smuggling

*
  • H
Stack-based Buffer Overflow

*
  • M
HTTP Request Smuggling

*
  • M
Information Exposure

*
  • M
CRLF Injection

*
  • M
CRLF Injection

*
  • H
HTTP Request Smuggling

<0:2.62.2-10.el7_9
  • H
Stack-based Buffer Overflow

*
  • M
Buffer Access with Incorrect Length Value

*
  • H
HTTP Request Smuggling

*
  • H
Integer Overflow or Wraparound

<0:2.62.2-9.el7_9
  • H
Out-of-bounds Read

<0:2.62.2-9.el7_9
  • M
Information Exposure Through Caching

*
  • H
Integer Underflow

<0:2.62.2-9.el7_9
  • H
Out-of-bounds Read

<0:2.62.2-9.el7_9
  • H
NULL Pointer Dereference

<0:2.62.2-9.el7_9
  • H
Free of Memory not on the Heap

<0:2.62.2-9.el7_9
  • H
Out-of-bounds Read

<0:2.62.2-9.el7_9
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.2-9.el7_9
  • H
Out-of-bounds Read

<0:2.62.2-9.el7_9
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Improper Handling of Case Sensitivity

*
  • M
Exposure of System Data to an Unauthorized Control Sphere

*
  • M
Memory Leak

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
NULL Pointer Dereference

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Buffer Over-read

*
  • M
Buffer Over-read

*
  • M
Buffer Under-read

*
  • H
Heap-based Buffer Overflow

<0:2.62.2-4.el7_9
  • H
HTTP Request Smuggling

<0:2.62.2-3.el7_9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Directory Traversal

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Stack-based Buffer Overflow

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • M
NULL Pointer Dereference

<0:2.62.2-2.el7
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • H
Stack-based Buffer Overflow

<0:2.56.0-4.el7_4
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-Bounds

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Information Exposure

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Out-of-bounds Read

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Improper Certificate Validation

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Buffer Overflow

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7
  • M
Uncontrolled Recursion

<0:2.62.2-2.el7