Buffer Overflow Vulnerability in GNOME libsoup Affecting Open Source Applications
CVE-2024-52531
Currently unrated
Summary
A buffer overflow vulnerability exists in GNOME libsoup before version 3.6.1, specifically in the 'soup_header_parse_param_list_strict' function. This vulnerability can be exploited in applications that perform character encoding conversions to UTF-8. While the overflow is initiated through network input, it cannot trigger this specific vulnerability, highlighting a potential security risk in handling encoded headers. Application developers using affected versions should implement appropriate security measures and upgrade to the latest version to mitigate this risk.
References
Timeline
Vulnerability published