SB2025052993 - Multiple vulnerabilities in libsoup
Published: May 29, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2025-4969)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when handling multipart HTTP messages. A remote attacker can trick the victim into visiting a specially crafted website, trigger an out-of-bounds read error and read contents of memory on the system.
2) Integer overflow (CVE-ID: CVE-2025-4945)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow when handling cookies. A remote attacker can trick the victim into visiting a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system.
3) Integer underflow (CVE-ID: CVE-2025-4948)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer underflow within the soup_multipart_new_from_message() function when handling multipart messages. A remote attacker can trick the victim into visiting a specially crafted website, trigger an integer underflow and crash the application.
4) NULL pointer dereference (CVE-ID: CVE-2025-4476)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. when handling 401 (Unauthorized) HTTP responses. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
5) Information disclosure (CVE-ID: CVE-2025-4035)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error when handling cookies, as libsoup clients mistakenly allow cookies to be set for public suffix
domains if the domain contains at least two components and includes an
uppercase character. A remote attacker can set cookies for the domain they do not have access to and perform session fixation attacks.
6) Out-of-bounds read (CVE-ID: CVE-2025-32914)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the soup_multipart_new_from_message() function. A remote attacker can trick the victim into visiting a specially crafted website, trigger an out-of-bounds read error and read contents of memory on the system.
7) Resource exhaustion (CVE-ID: CVE-2025-32907)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling HTTP requests. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
8) Resource exhaustion (CVE-ID: CVE-2025-32049)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in SoupWebsocketConnection. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2367552
- https://bugzilla.redhat.com/show_bug.cgi?id=2367175
- https://bugzilla.redhat.com/show_bug.cgi?id=2367183
- https://bugzilla.redhat.com/show_bug.cgi?id=2366513
- https://bugzilla.redhat.com/show_bug.cgi?id=2362651
- https://bugzilla.redhat.com/show_bug.cgi?id=2359358
- https://bugzilla.redhat.com/show_bug.cgi?id=2359342
- https://bugzilla.redhat.com/show_bug.cgi?id=2357066