4.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
- @LeSuisse accepted
- @LeSuisse published on GitHub
Libsoup: out-of-bounds read in libsoup websocket frame processing
A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted.
References
Affected products
Package maintainers
-
@bobby285271 Bobby Rong <rjl931189261@126.com>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>