Vulnerability Details : CVE-2024-52532
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
Products affected by CVE-2024-52532
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-52532
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-52532
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-11-12 |
CWE ids for CVE-2024-52532
-
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2024-52532
-
https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
Infinite loop while reading websocket data (#391) · Issues · GNOME / libsoup · GitLab
-
https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
Home · Wiki · Teams / Releng / Security · GitLab
-
https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
websocket: process the frame as soon as we read data (!410) · Merge requests · GNOME / libsoup · GitLab
Jump to