libsoup vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libsoup package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
HTTP Request Smuggling

*
  • H
Integer Overflow or Wraparound

<0:2.62.3-1.el8_2.6
  • H
Out-of-bounds Read

<0:2.62.3-1.el8_2.6
  • H
Integer Overflow or Wraparound

<0:2.62.3-2.el8_4.6
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.6
  • H
Integer Overflow or Wraparound

<0:2.62.3-3.el8_8.6
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.6
  • H
Integer Overflow or Wraparound

<0:2.62.3-2.el8_6.6
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.6
  • H
Integer Overflow or Wraparound

<0:2.62.3-2.el8_6.6
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.6
  • H
Integer Overflow or Wraparound

<0:2.62.3-2.el8_6.6
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.6
  • M
Use After Free

*
  • H
Out-of-bounds Read

<0:2.62.3-10.el8_10
  • M
Information Exposure Through Caching

*
  • M
Out-of-bounds Write

*
  • H
Integer Underflow

<0:2.62.3-2.el8_4.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-2.el8_4.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.5
  • H
Integer Underflow

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Integer Underflow

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Integer Underflow

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-2.el8_6.5
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.5
  • H
Integer Underflow

<0:2.62.3-1.el8_2.5
  • H
Out-of-bounds Read

<0:2.62.3-1.el8_2.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-1.el8_2.5
  • H
Out-of-bounds Read

<0:2.62.3-1.el8_2.5
  • H
Integer Underflow

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Integer Underflow

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Integer Underflow

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Integer Underflow

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-3.el8_8.5
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.5
  • M
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

<0:2.62.3-10.el8_10
  • H
Integer Underflow

<0:2.62.3-9.el8_10
  • L
NULL Pointer Dereference

*
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-3.el8_8.4
  • H
Memory Leak

<0:2.62.3-3.el8_8.4
  • H
NULL Pointer Dereference

<0:2.62.3-3.el8_8.4
  • H
Free of Memory not on the Heap

<0:2.62.3-3.el8_8.4
  • H
Out-of-bounds Read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Over-read

<0:2.62.3-3.el8_8.4
  • H
Buffer Under-read

<0:2.62.3-3.el8_8.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_6.4
  • H
Memory Leak

<0:2.62.3-2.el8_6.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_6.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_6.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_6.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-2.el8_4.4
  • H
Memory Leak

<0:2.62.3-2.el8_4.4
  • H
NULL Pointer Dereference

<0:2.62.3-2.el8_4.4
  • H
Free of Memory not on the Heap

<0:2.62.3-2.el8_4.4
  • H
Out-of-bounds Read

<0:2.62.3-2.el8_4.4
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-1.el8_2.4
  • H
Memory Leak

<0:2.62.3-1.el8_2.4
  • H
NULL Pointer Dereference

<0:2.62.3-1.el8_2.4
  • H
Free of Memory not on the Heap

<0:2.62.3-1.el8_2.4
  • H
Out-of-bounds Read

<0:2.62.3-1.el8_2.4
  • M
Improper Handling of Case Sensitivity

*
  • H
Memory Leak

<0:2.62.3-8.el8_10
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:2.62.3-8.el8_10
  • H
Out-of-bounds Read

<0:2.62.3-9.el8_10
  • H
Free of Memory not on the Heap

<0:2.62.3-8.el8_10
  • H
Out-of-bounds Read

<0:2.62.3-8.el8_10
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:2.62.3-8.el8_10
  • H
Buffer Over-read

<0:2.62.3-8.el8_10
  • H
Buffer Under-read

<0:2.62.3-8.el8_10
  • H
Buffer Over-read

<0:2.62.3-8.el8_10
  • H
Out-of-bounds Read

<0:2.62.3-9.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:2.62.3-9.el8_10
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-3.el8_8.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_6.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-2.el8_4.2
  • H
Heap-based Buffer Overflow

<0:2.62.3-1.el8_2.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.62.3-6.el8_10
  • H
HTTP Request Smuggling

<0:2.62.3-6.el8_10
  • H
Heap-based Buffer Overflow

<0:2.62.3-7.el8_10
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-3.el8_8.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_6.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-2.el8_4.1
  • H
HTTP Request Smuggling

<0:2.62.3-1.el8_2.1