CVE-2024-52531: CWE-787 Out-of-bounds Write in GNOME libsoup
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
CVE-2024-52531: CWE-787 Out-of-bounds Write in GNOME libsoup
Description
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-11-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092eed35043901e82cb103
Added to database: 11/3/2025, 10:38:37 PM
Last updated: 11/3/2025, 10:45:28 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-54531: An app may be able to bypass kASLR in Apple macOS
MediumCVE-2024-54529: An app may be able to execute arbitrary code with kernel privileges in Apple macOS
HighCVE-2024-54528: An app may be able to overwrite arbitrary files in Apple macOS
HighCVE-2024-54527: An app may be able to access sensitive user data in Apple tvOS
MediumCVE-2024-54526: A malicious app may be able to access private information in Apple tvOS
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.