------------------------------------------------------------------------- Debian LTS Advisory DLA-4140-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Andreas Henriksson April 27, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : libsoup2.4 Version : 2.72.0-2+deb11u2 CVE ID : CVE-2025-2784 CVE-2025-32050 CVE-2025-32052 CVE-2025-32053 CVE-2025-32906 CVE-2025-32909 CVE-2025-32910 CVE-2025-32911 CVE-2025-32912 CVE-2025-32913 CVE-2025-32914 Debian Bug : 1091502 1102208 1102212 1102214 1102215 1103521 1103517 1103516 1103515 1103267 1103512 Several security vulnerabilities have been discovered in libsoup2.4, a http client/server library popularly used in GNOME, et.al. CVE-2025-2784 The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server. CVE-2025-32050 The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read. CVE-2025-32052 A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. CVE-2025-32053 A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read. CVE-2025-32906 The soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. CVE-2025-32909 SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash. CVE-2025-32910 A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. CVE-2025-32911 Vulnerable to a use-after-free memory issue not on the heap in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server. CVE-2025-32912 SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash. CVE-2025-32913 The soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function. CVE-2025-32914 The soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. Additionally this update also includes a fix to extend the lifetime of a certificate used by the test-suite during build to avoid expiring soon. Note that this update does *not* yet address CVE-2025-32907 and CVE-2025-32049 which are still being discussed. For Debian 11 bullseye, these problems have been fixed in version 2.72.0-2+deb11u2. We recommend that you upgrade your libsoup2.4 packages. For the detailed security status of libsoup2.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libsoup2.4 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature