HomeGnomeCVE-2025-2784

CVE-2025-2784

HIGH
7.0CVSS
Published: 2025-04-03
Updated: 2025-11-18
AI Analysis

Description

A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
high
Weaknesses
CWE-125

Metadata

Primary Vendor
GNOME
Published
4/3/2025
Last Modified
11/18/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

gnome : libsoupredhat : codeready_linux_builderredhat : codeready_linux_builder_for_arm64redhat : codeready_linux_builder_for_arm64_eusredhat : codeready_linux_builder_for_ibm_z_systemsredhat : codeready_linux_builder_for_ibm_z_systems_eusredhat : codeready_linux_builder_for_power_little_endianredhat : codeready_linux_builder_for_power_little_endian_eusredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_update_services_for_sap_solutionsredhat : enterprise_linux_update_services_for_sap_solutionsredhat : enterprise_linux_update_services_for_sap_solutionsredhat : enterprise_linux_update_services_for_sap_solutionsredhat : enterprise_linux_update_services_for_sap_solutions

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-2784 | HIGH Severity | CVEDatabase.com | CVEDatabase.com