7.4 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
References
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9179 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9179 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9179 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/04/msg00036.html
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9179 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/04/msg00036.html
- RHSA-2025:21657 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7505 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8126 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8132 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8139 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8140 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8252 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8480 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8481 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8482 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8663 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9179 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32914 x_refsource_REDHAT vdb-entry
- RHBZ#2359358 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/04/msg00036.html
Affected products
- <3.6.5
- *
- *
Matching in nixpkgs
pkgs.libsoup_2_4
HTTP client/server library for GNOME
-
nixos-unstable -
- nixpkgs-unstable 2.74.3
Package maintainers
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>