A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does not validate the `name` parameter passed in, and directly accesses `soup_header_name_strings[name]`. The value of `name` is controllable, when `name` exceeds the index range of `soup_headr_name_string`, it will cause an out-of-bounds access.
References
Configurations
No configuration.
History
29 Jul 2025, 14:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-25 20:15
Updated : 2025-07-29 14:14
NVD link : CVE-2025-8197
Mitre link : CVE-2025-8197
CVE.ORG link : CVE-2025-8197
JSON object : View
Products Affected
No product.
CWE
CWE-787
Out-of-bounds Write