6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
Libsoup: heap buffer overflow in sniff_unknown()
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
References
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8292 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8292 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8292 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8292 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/04/msg00036.html
- RHSA-2025:4440 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4508 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4560 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4568 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7436 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8292 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-32052 x_refsource_REDHAT vdb-entry
- RHBZ#2357069 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/04/msg00036.html
Affected products
- <3.6.1
- *
- *
- *
Matching in nixpkgs
pkgs.libsoup_2_4
HTTP client/server library for GNOME
-
nixos-unstable -
- nixpkgs-unstable 2.74.3
Package maintainers
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>