Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-4948 (GCVE-0-2025-4948)
Vulnerability from cvelistv5 – Published: 2025-05-19 15:55 – Updated: 2025-11-18 08:34- CWE-191 - Integer Underflow (Wrap or Wraparound)
| Vendor | Product | Version | |
|---|---|---|---|
|
Affected:
0 , ≤ 3.6.5
(semver)
|
|||
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
0:3.6.5-3.el10_0.6 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.0 |
|
| Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support |
Unaffected:
0:2.62.2-9.el7_9 , < *
(rpm)
cpe:/o:redhat:rhel_els:7 |
|
| Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support |
Unaffected:
0:2.62.2-6.el7_9 , < *
(rpm)
cpe:/o:redhat:rhel_els:7 |
|
| Red Hat | Red Hat Enterprise Linux 8 |
Unaffected:
0:2.62.3-9.el8_10 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:8::baseos cpe:/a:redhat:enterprise_linux:8::appstream |
|
| Red Hat | Red Hat Enterprise Linux 8 |
Unaffected:
0:2.62.3-9.el8_10 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:8::baseos cpe:/a:redhat:enterprise_linux:8::appstream |
|
| Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support |
Unaffected:
0:2.62.3-1.el8_2.5 , < *
(rpm)
cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/o:redhat:rhel_aus:8.2::baseos |
|
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support |
Unaffected:
0:2.62.3-2.el8_4.5 , < *
(rpm)
cpe:/o:redhat:rhel_aus:8.4::baseos cpe:/a:redhat:rhel_aus:8.4::appstream |
|
| Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support |
Unaffected:
0:2.62.3-2.el8_6.5 , < *
(rpm)
cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/o:redhat:rhel_aus:8.6::baseos cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_e4s:8.6::baseos cpe:/o:redhat:rhel_tus:8.6::baseos |
|
| Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service |
Unaffected:
0:2.62.3-2.el8_6.5 , < *
(rpm)
cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/o:redhat:rhel_aus:8.6::baseos cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_e4s:8.6::baseos cpe:/o:redhat:rhel_tus:8.6::baseos |
|
| Red Hat | Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions |
Unaffected:
0:2.62.3-2.el8_6.5 , < *
(rpm)
cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/o:redhat:rhel_aus:8.6::baseos cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_e4s:8.6::baseos cpe:/o:redhat:rhel_tus:8.6::baseos |
|
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support |
Unaffected:
0:2.62.3-3.el8_8.5 , < *
(rpm)
cpe:/a:redhat:rhel_eus:8.8::appstream cpe:/o:redhat:rhel_eus:8.8::baseos |
|
| Red Hat | Red Hat Enterprise Linux 9 |
Unaffected:
0:2.72.0-10.el9_6.2 , < *
(rpm)
cpe:/a:redhat:enterprise_linux:9::appstream |
|
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions |
Unaffected:
0:2.72.0-8.el9_0.5 , < *
(rpm)
cpe:/a:redhat:rhel_e4s:9.0::appstream |
|
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support |
Unaffected:
0:2.72.0-8.el9_2.5 , < *
(rpm)
cpe:/a:redhat:rhel_eus:9.2::appstream |
|
| Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support |
Unaffected:
0:2.72.0-8.el9_4.5 , < *
(rpm)
cpe:/a:redhat:rhel_eus:9.4::appstream |
|
| Red Hat | Red Hat Enterprise Linux 6 |
cpe:/o:redhat:enterprise_linux:6 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4948",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-19T16:53:09.791116Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-19T16:53:17.287Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://gitlab.gnome.org/GNOME/libsoup",
"defaultStatus": "unaffected",
"packageName": "libsoup",
"versions": [
{
"lessThanOrEqual": "3.6.5",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.0"
],
"defaultStatus": "affected",
"packageName": "libsoup3",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:3.6.5-3.el10_0.6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.2-9.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.2-6.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-9.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-9.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-1.el8_2.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/a:redhat:rhel_aus:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-2.el8_4.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-2.el8_6.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-2.el8_6.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-2.el8_6.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 8.8 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.62.3-3.el8_8.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.72.0-10.el9_6.2",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.72.0-8.el9_0.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 9.2 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.72.0-8.el9_2.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
],
"defaultStatus": "affected",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.72.0-8.el9_4.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "libsoup",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank fouzhe and zkbytes for reporting this issue."
}
],
"datePublic": "2025-05-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-191",
"description": "Integer Underflow (Wrap or Wraparound)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T08:34:19.758Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2025:21657",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:21657"
},
{
"name": "RHSA-2025:8126",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8126"
},
{
"name": "RHSA-2025:8128",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8128"
},
{
"name": "RHSA-2025:8132",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8132"
},
{
"name": "RHSA-2025:8139",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8139"
},
{
"name": "RHSA-2025:8140",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8140"
},
{
"name": "RHSA-2025:8252",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8252"
},
{
"name": "RHSA-2025:8480",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8480"
},
{
"name": "RHSA-2025:8481",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8481"
},
{
"name": "RHSA-2025:8482",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8482"
},
{
"name": "RHSA-2025:8663",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8663"
},
{
"name": "RHSA-2025:9179",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:9179"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"name": "RHBZ#2367183",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367183"
},
{
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/449"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-05-19T05:22:19.904Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-05-19T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup",
"workarounds": [
{
"lang": "en",
"value": "To mitigate this issue, Red Hat recommends avoiding the use of libsoup with untrusted or unauthenticated multipart HTTP message sources until updated packages are available. Administrators can deploy application-level filters or HTTP proxies that reject malformed multipart requests. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this integer underflow vulnerability and restore the stability of affected services."
}
],
"x_redhatCweChain": "CWE-191: Integer Underflow (Wrap or Wraparound)"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-4948",
"datePublished": "2025-05-19T15:55:46.230Z",
"dateReserved": "2025-05-19T06:24:43.391Z",
"dateUpdated": "2025-11-18T08:34:19.758Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-4948",
"date": "2026-05-21",
"epss": "0.00986",
"percentile": "0.77063"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-4948\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-05-19T16:15:36.790\",\"lastModified\":\"2025-11-18T09:15:53.057\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en la funci\u00f3n soup_multipart_new_from_message() de la librer\u00eda HTTP libsoup, com\u00fanmente utilizada por GNOME y otras aplicaciones para gestionar las comunicaciones web. El problema ocurre cuando la librer\u00eda procesa mensajes multiparte especialmente manipulados. Debido a una validaci\u00f3n incorrecta, un c\u00e1lculo interno puede fallar, provocando un desbordamiento de enteros. Esto puede provocar que el programa acceda a memoria no v\u00e1lida y se bloquee. Como resultado, cualquier aplicaci\u00f3n o servidor que utilice libsoup podr\u00eda verse obligado a cerrarse inesperadamente, creando un riesgo de denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:21657\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8128\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8132\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8139\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8140\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8252\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8480\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8481\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8482\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8663\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:9179\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-4948\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2367183\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://gitlab.gnome.org/GNOME/libsoup/-/issues/449\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-4948\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-19T16:53:09.791116Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-19T16:53:14.594Z\"}}], \"cna\": {\"title\": \"Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank fouzhe and zkbytes for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.6.5\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://gitlab.gnome.org/GNOME/libsoup\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:3.6.5-3.el10_0.6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup3\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.2-9.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.2-6.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::baseos\", \"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-9.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::baseos\", \"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-9.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.2::appstream\", \"cpe:/o:redhat:rhel_aus:8.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-1.el8_2.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_aus:8.4::baseos\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-2.el8_4.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-2.el8_6.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-2.el8_6.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-2.el8_6.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.8::appstream\", \"cpe:/o:redhat:rhel_eus:8.8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.62.3-3.el8_8.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.72.0-10.el9_6.2\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.72.0-8.el9_0.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.72.0-8.el9_2.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.72.0-8.el9_4.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"libsoup\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-05-19T05:22:19.904000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-05-19T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-05-19T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:21657\", \"name\": \"RHSA-2025:21657\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8126\", \"name\": \"RHSA-2025:8126\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8128\", \"name\": \"RHSA-2025:8128\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8132\", \"name\": \"RHSA-2025:8132\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8139\", \"name\": \"RHSA-2025:8139\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8140\", \"name\": \"RHSA-2025:8140\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8252\", \"name\": \"RHSA-2025:8252\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8480\", \"name\": \"RHSA-2025:8480\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8481\", \"name\": \"RHSA-2025:8481\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8482\", \"name\": \"RHSA-2025:8482\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8663\", \"name\": \"RHSA-2025:8663\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:9179\", \"name\": \"RHSA-2025:9179\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-4948\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2367183\", \"name\": \"RHBZ#2367183\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://gitlab.gnome.org/GNOME/libsoup/-/issues/449\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"To mitigate this issue, Red Hat recommends avoiding the use of libsoup with untrusted or unauthenticated multipart HTTP message sources until updated packages are available. Administrators can deploy application-level filters or HTTP proxies that reject malformed multipart requests. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this integer underflow vulnerability and restore the stability of affected services.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-191\", \"description\": \"Integer Underflow (Wrap or Wraparound)\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-18T08:34:19.758Z\"}, \"x_redhatCweChain\": \"CWE-191: Integer Underflow (Wrap or Wraparound)\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-4948\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-18T08:34:19.758Z\", \"dateReserved\": \"2025-05-19T06:24:43.391Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-05-19T15:55:46.230Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2025:8126
Vulnerability from osv_almalinux
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
- libsoup: Heap buffer over-read in
skip_insignificant_spacewhen sniffing content (CVE-2025-2784) - libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
- libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)
- libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsoup"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.72.0-10.el9_6.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsoup-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.72.0-10.el9_6.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The libsoup packages provide an HTTP client and server library for GNOME. \n\nSecurity Fix(es): \n\n * libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784)\n * libsoup: Denial of Service attack to websocket server (CVE-2025-32049)\n * libsoup: OOB Read on libsoup through function \"soup_multipart_new_from_message\" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)\n * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:8126",
"modified": "2025-05-26T16:11:18Z",
"published": "2025-05-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:8126"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-2784"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32049"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32914"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2354669"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2357066"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359358"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2367183"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-8126.html"
}
],
"related": [
"CVE-2025-2784",
"CVE-2025-32049",
"CVE-2025-32914",
"CVE-2025-4948"
],
"summary": "Important: libsoup security update"
}
alsa-2025:8128
Vulnerability from osv_almalinux
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
- libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
- libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907)
- libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035)
- libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "libsoup3-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.5-3.el10_0.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. \n\nSecurity Fix(es): \n\n * libsoup: Denial of Service attack to websocket server (CVE-2025-32049)\n * libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907)\n * libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035)\n * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:8128",
"modified": "2025-05-29T10:09:38Z",
"published": "2025-05-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:8128"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32049"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32907"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-4035"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2357066"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359342"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2362651"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2367183"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2025-8128.html"
}
],
"related": [
"CVE-2025-32049",
"CVE-2025-32907",
"CVE-2025-4035",
"CVE-2025-4948"
],
"summary": "Important: libsoup3 security update"
}
alsa-2025:8132
Vulnerability from osv_almalinux
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
- libsoup: Heap buffer over-read in
skip_insignificant_spacewhen sniffing content (CVE-2025-2784) - libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
- libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)
- libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsoup"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.62.3-9.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsoup-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.62.3-9.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The libsoup packages provide an HTTP client and server library for GNOME. \n\nSecurity Fix(es): \n\n * libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784)\n * libsoup: Denial of Service attack to websocket server (CVE-2025-32049)\n * libsoup: OOB Read on libsoup through function \"soup_multipart_new_from_message\" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)\n * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:8132",
"modified": "2025-05-26T16:12:39Z",
"published": "2025-05-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:8132"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-2784"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32049"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-32914"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2354669"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2357066"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359358"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2367183"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-8132.html"
}
],
"related": [
"CVE-2025-2784",
"CVE-2025-32049",
"CVE-2025-32914",
"CVE-2025-4948"
],
"summary": "Important: libsoup security update"
}
BDU:2025-07136
Vulnerability from fstec - Published: 19.05.2025{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, GNOME Foundation",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 9 (Red Hat Enterprise Linux), 1.8 (Astra Linux Special Edition), - (libsoup), 10 (Red Hat Enterprise Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2025-4948\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2025-4948\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0430\u0443\u0434\u0438\u0442\u0430 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430 \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n- \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libsoup3 \u0434\u043e 3.2.2-2.astra7 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0811SE18\n- \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libsoup2.4 \u0434\u043e 2.74.3-1+deb12u1.astra6 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0811SE18\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libsoup2.4 \u0434\u043e 2.72.0-2+deb12u1.astra3 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0923SE17\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libsoup2.4 \u0434\u043e 2.72.0-2+deb12u1.astra3 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1020SE47",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "19.05.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-07136",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-4948",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), libsoup",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 soup_multipart_new_from_message() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libsoup \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 GNOME, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u0430\u044f \u043f\u043e\u0442\u0435\u0440\u044f \u0437\u043d\u0430\u0447\u0438\u043c\u043e\u0441\u0442\u0438 (\u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433) (CWE-191)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 soup_multipart_new_from_message() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libsoup \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 GNOME \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2025-4948\nhttps://access.redhat.com/security/cve/cve-2025-4948\nhttps://security-tracker.debian.org/tracker/CVE-2025-4948\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0811SE18\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0923SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1020SE47",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-191",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
CERTFR-2025-AVI-0938
Vulnerability from certfr_avis - Published: 2025-10-30 - Updated: 2025-10-30
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 4.3.1 sur Kubernetes | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.31.0 | ||
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.6.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.1 sur Kubernetes",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.31.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.6.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2022-39176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39176"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2021-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2019-25059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25059"
},
{
"name": "CVE-2024-46951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46951"
},
{
"name": "CVE-2025-31273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31273"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32913"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2022-39177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39177"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2720"
},
{
"name": "CVE-2024-46956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46956"
},
{
"name": "CVE-2025-58060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58060"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46953"
},
{
"name": "CVE-2025-24216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
},
{
"name": "CVE-2025-43212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43212"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-24150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24150"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2023-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2222"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2784"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2024-44192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44192"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2723"
},
{
"name": "CVE-2025-31278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31278"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2023-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46751"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2724"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2022-30294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2024-46954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46954"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32914"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-43343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-32906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32906"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-43216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43216"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2025-52194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52194"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2023-24607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
},
{
"name": "CVE-2025-24209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
},
{
"name": "CVE-2024-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0444"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2017-17973",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17973"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-32049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32049"
},
{
"name": "CVE-2025-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4948"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-4453",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4453"
},
{
"name": "CVE-2025-31257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-11021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11021"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2024-46952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46952"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-7345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7345"
},
{
"name": "CVE-2025-30427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
},
{
"name": "CVE-2025-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32911"
}
],
"initial_release_date": "2025-10-30T00:00:00",
"last_revision_date": "2025-10-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0938",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36277",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36277"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36284",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36284"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36281",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36281"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36282",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36282"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36283",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36283"
}
]
}
FKIE_CVE-2025-4948
Vulnerability from fkie_nvd - Published: 2025-05-19 16:15 - Updated: 2026-04-15 00:35| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:21657 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8126 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8128 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8132 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8139 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8140 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8252 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8480 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8481 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8482 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:8663 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:9179 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-4948 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2367183 | ||
| secalert@redhat.com | https://gitlab.gnome.org/GNOME/libsoup/-/issues/449 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en la funci\u00f3n soup_multipart_new_from_message() de la librer\u00eda HTTP libsoup, com\u00fanmente utilizada por GNOME y otras aplicaciones para gestionar las comunicaciones web. El problema ocurre cuando la librer\u00eda procesa mensajes multiparte especialmente manipulados. Debido a una validaci\u00f3n incorrecta, un c\u00e1lculo interno puede fallar, provocando un desbordamiento de enteros. Esto puede provocar que el programa acceda a memoria no v\u00e1lida y se bloquee. Como resultado, cualquier aplicaci\u00f3n o servidor que utilice libsoup podr\u00eda verse obligado a cerrarse inesperadamente, creando un riesgo de denegaci\u00f3n de servicio (DoS)."
}
],
"id": "CVE-2025-4948",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-05-19T16:15:36.790",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:21657"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8126"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8128"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8132"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8139"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8140"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8252"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8480"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8481"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8482"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8663"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:9179"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367183"
},
{
"source": "secalert@redhat.com",
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/449"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-191"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-5C6Q-HVVG-576R
Vulnerability from github – Published: 2025-05-19 18:30 – Updated: 2025-11-18 09:30A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
{
"affected": [],
"aliases": [
"CVE-2025-4948"
],
"database_specific": {
"cwe_ids": [
"CWE-191"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-05-19T16:15:36Z",
"severity": "HIGH"
},
"details": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.",
"id": "GHSA-5c6q-hvvg-576r",
"modified": "2025-11-18T09:30:51Z",
"published": "2025-05-19T18:30:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4948"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:21657"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8126"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8128"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8132"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8139"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8140"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8252"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8480"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8481"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8482"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8663"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:9179"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-4948"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367183"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/449"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-4948
Vulnerability from csaf_microsoft - Published: 2025-05-02 00:00 - Updated: 2026-02-21 03:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 19568-17086 | — | ||
| Unresolved product id: 19617-17084 | — | ||
| Unresolved product id: 20186-17086 | — | ||
| Unresolved product id: 19596-17084 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4948 Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-4948.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup",
"tracking": {
"current_release_date": "2026-02-21T03:00:46.000Z",
"generator": {
"date": "2026-02-25T08:25:47.691Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-4948",
"initial_release_date": "2025-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-08-11T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-08-12T00:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Added libsoup to CBL-Mariner 2.0\nAdded libsoup to Azure Linux 3.0"
},
{
"date": "2026-02-21T03:00:46.000Z",
"legacy_version": "2.1",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 libsoup 3.0.4-8",
"product": {
"name": "\u003ccbl2 libsoup 3.0.4-8",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 libsoup 3.0.4-8",
"product": {
"name": "cbl2 libsoup 3.0.4-8",
"product_id": "19568"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libsoup 3.4.4-8",
"product": {
"name": "\u003cazl3 libsoup 3.4.4-8",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 libsoup 3.4.4-8",
"product": {
"name": "azl3 libsoup 3.4.4-8",
"product_id": "19617"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libsoup 3.0.4-7",
"product": {
"name": "\u003ccbl2 libsoup 3.0.4-7",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libsoup 3.0.4-7",
"product": {
"name": "cbl2 libsoup 3.0.4-7",
"product_id": "20186"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libsoup 3.4.4-7",
"product": {
"name": "\u003cazl3 libsoup 3.4.4-7",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 libsoup 3.4.4-7",
"product": {
"name": "azl3 libsoup 3.4.4-7",
"product_id": "19596"
}
}
],
"category": "product_name",
"name": "libsoup"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libsoup 3.0.4-8 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libsoup 3.0.4-8 as a component of CBL Mariner 2.0",
"product_id": "19568-17086"
},
"product_reference": "19568",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libsoup 3.4.4-8 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libsoup 3.4.4-8 as a component of Azure Linux 3.0",
"product_id": "19617-17084"
},
"product_reference": "19617",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libsoup 3.0.4-7 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libsoup 3.0.4-7 as a component of CBL Mariner 2.0",
"product_id": "20186-17086"
},
"product_reference": "20186",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libsoup 3.4.4-7 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libsoup 3.4.4-7 as a component of Azure Linux 3.0",
"product_id": "19596-17084"
},
"product_reference": "19596",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4948",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19568-17086",
"19617-17084",
"20186-17086",
"19596-17084"
],
"known_affected": [
"17086-4",
"17084-2",
"17086-1",
"17084-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4948 Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-4948.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-11T00:00:00.000Z",
"details": "3.0.4-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-08-11T00:00:00.000Z",
"details": "3.4.4-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2",
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-4",
"17084-2",
"17086-1",
"17084-3"
]
}
],
"title": "Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup"
}
]
}
OPENSUSE-SU-2025:15185-1
Vulnerability from csaf_opensuse - Published: 2025-05-31 00:00 - Updated: 2025-05-31 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2025-4476/ | self |
| https://www.suse.com/security/cve/CVE-2025-4948/ | self |
| https://www.suse.com/security/cve/CVE-2025-4969/ | self |
| https://www.suse.com/security/cve/CVE-2025-4476 | external |
| https://bugzilla.suse.com/1243422 | external |
| https://www.suse.com/security/cve/CVE-2025-4948 | external |
| https://bugzilla.suse.com/1243332 | external |
| https://bugzilla.suse.com/1250562 | external |
| https://www.suse.com/security/cve/CVE-2025-4969 | external |
| https://bugzilla.suse.com/1243423 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsoup-3_0-0-3.6.5-5.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsoup-3_0-0-3.6.5-5.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15185",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15185-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4476 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4476/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4948 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4969 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4969/"
}
],
"title": "libsoup-3_0-0-3.6.5-5.1 on GA media",
"tracking": {
"current_release_date": "2025-05-31T00:00:00Z",
"generator": {
"date": "2025-05-31T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15185-1",
"initial_release_date": "2025-05-31T00:00:00Z",
"revision_history": [
{
"date": "2025-05-31T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsoup-3_0-0-3.6.5-5.1.aarch64",
"product": {
"name": "libsoup-3_0-0-3.6.5-5.1.aarch64",
"product_id": "libsoup-3_0-0-3.6.5-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"product": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"product_id": "libsoup-3_0-0-32bit-3.6.5-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup-devel-3.6.5-5.1.aarch64",
"product": {
"name": "libsoup-devel-3.6.5-5.1.aarch64",
"product_id": "libsoup-devel-3.6.5-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup-devel-32bit-3.6.5-5.1.aarch64",
"product": {
"name": "libsoup-devel-32bit-3.6.5-5.1.aarch64",
"product_id": "libsoup-devel-32bit-3.6.5-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup-lang-3.6.5-5.1.aarch64",
"product": {
"name": "libsoup-lang-3.6.5-5.1.aarch64",
"product_id": "libsoup-lang-3.6.5-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"product": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"product_id": "typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-3_0-0-3.6.5-5.1.ppc64le",
"product": {
"name": "libsoup-3_0-0-3.6.5-5.1.ppc64le",
"product_id": "libsoup-3_0-0-3.6.5-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"product": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"product_id": "libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup-devel-3.6.5-5.1.ppc64le",
"product": {
"name": "libsoup-devel-3.6.5-5.1.ppc64le",
"product_id": "libsoup-devel-3.6.5-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"product": {
"name": "libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"product_id": "libsoup-devel-32bit-3.6.5-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup-lang-3.6.5-5.1.ppc64le",
"product": {
"name": "libsoup-lang-3.6.5-5.1.ppc64le",
"product_id": "libsoup-lang-3.6.5-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"product": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"product_id": "typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-3_0-0-3.6.5-5.1.s390x",
"product": {
"name": "libsoup-3_0-0-3.6.5-5.1.s390x",
"product_id": "libsoup-3_0-0-3.6.5-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"product": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"product_id": "libsoup-3_0-0-32bit-3.6.5-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup-devel-3.6.5-5.1.s390x",
"product": {
"name": "libsoup-devel-3.6.5-5.1.s390x",
"product_id": "libsoup-devel-3.6.5-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup-devel-32bit-3.6.5-5.1.s390x",
"product": {
"name": "libsoup-devel-32bit-3.6.5-5.1.s390x",
"product_id": "libsoup-devel-32bit-3.6.5-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup-lang-3.6.5-5.1.s390x",
"product": {
"name": "libsoup-lang-3.6.5-5.1.s390x",
"product_id": "libsoup-lang-3.6.5-5.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"product": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"product_id": "typelib-1_0-Soup-3_0-3.6.5-5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-3_0-0-3.6.5-5.1.x86_64",
"product": {
"name": "libsoup-3_0-0-3.6.5-5.1.x86_64",
"product_id": "libsoup-3_0-0-3.6.5-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"product": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"product_id": "libsoup-3_0-0-32bit-3.6.5-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup-devel-3.6.5-5.1.x86_64",
"product": {
"name": "libsoup-devel-3.6.5-5.1.x86_64",
"product_id": "libsoup-devel-3.6.5-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup-devel-32bit-3.6.5-5.1.x86_64",
"product": {
"name": "libsoup-devel-32bit-3.6.5-5.1.x86_64",
"product_id": "libsoup-devel-32bit-3.6.5-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup-lang-3.6.5-5.1.x86_64",
"product": {
"name": "libsoup-lang-3.6.5-5.1.x86_64",
"product_id": "libsoup-lang-3.6.5-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64",
"product": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64",
"product_id": "typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64"
},
"product_reference": "libsoup-3_0-0-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le"
},
"product_reference": "libsoup-3_0-0-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x"
},
"product_reference": "libsoup-3_0-0-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64"
},
"product_reference": "libsoup-3_0-0-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64"
},
"product_reference": "libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le"
},
"product_reference": "libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x"
},
"product_reference": "libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-3_0-0-32bit-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64"
},
"product_reference": "libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64"
},
"product_reference": "libsoup-devel-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le"
},
"product_reference": "libsoup-devel-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x"
},
"product_reference": "libsoup-devel-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64"
},
"product_reference": "libsoup-devel-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-32bit-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64"
},
"product_reference": "libsoup-devel-32bit-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-32bit-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le"
},
"product_reference": "libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-32bit-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x"
},
"product_reference": "libsoup-devel-32bit-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-devel-32bit-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64"
},
"product_reference": "libsoup-devel-32bit-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-lang-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64"
},
"product_reference": "libsoup-lang-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-lang-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le"
},
"product_reference": "libsoup-lang-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-lang-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x"
},
"product_reference": "libsoup-lang-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-lang-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64"
},
"product_reference": "libsoup-lang-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64"
},
"product_reference": "typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le"
},
"product_reference": "typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x"
},
"product_reference": "typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
},
"product_reference": "typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4476",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4476"
}
],
"notes": [
{
"category": "general",
"text": "A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a user\u0027s application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a user\u0027s client application into connecting to the attacker\u0027s malicious server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4476",
"url": "https://www.suse.com/security/cve/CVE-2025-4476"
},
{
"category": "external",
"summary": "SUSE Bug 1243422 for CVE-2025-4476",
"url": "https://bugzilla.suse.com/1243422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-31T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-4476"
},
{
"cve": "CVE-2025-4948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4948"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4948",
"url": "https://www.suse.com/security/cve/CVE-2025-4948"
},
{
"category": "external",
"summary": "SUSE Bug 1243332 for CVE-2025-4948",
"url": "https://bugzilla.suse.com/1243332"
},
{
"category": "external",
"summary": "SUSE Bug 1250562 for CVE-2025-4948",
"url": "https://bugzilla.suse.com/1250562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-31T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-4948"
},
{
"cve": "CVE-2025-4969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4969"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4969",
"url": "https://www.suse.com/security/cve/CVE-2025-4969"
},
{
"category": "external",
"summary": "SUSE Bug 1243423 for CVE-2025-4969",
"url": "https://bugzilla.suse.com/1243423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-3_0-0-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-devel-32bit-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:libsoup-lang-3.6.5-5.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-3_0-3.6.5-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-31T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-4969"
}
]
}
OPENSUSE-SU-2025:15189-1
Vulnerability from csaf_opensuse - Published: 2025-06-01 00:00 - Updated: 2025-06-01 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://www.suse.com/security/cve/CVE-2025-32906/ | self |
| https://www.suse.com/security/cve/CVE-2025-32909/ | self |
| https://www.suse.com/security/cve/CVE-2025-32910/ | self |
| https://www.suse.com/security/cve/CVE-2025-32912/ | self |
| https://www.suse.com/security/cve/CVE-2025-32913/ | self |
| https://www.suse.com/security/cve/CVE-2025-4948/ | self |
| https://www.suse.com/security/cve/CVE-2025-4969/ | self |
| https://www.suse.com/security/cve/CVE-2025-32906 | external |
| https://bugzilla.suse.com/1241263 | external |
| https://bugzilla.suse.com/1250562 | external |
| https://www.suse.com/security/cve/CVE-2025-32909 | external |
| https://bugzilla.suse.com/1241226 | external |
| https://www.suse.com/security/cve/CVE-2025-32910 | external |
| https://bugzilla.suse.com/1241252 | external |
| https://www.suse.com/security/cve/CVE-2025-32912 | external |
| https://bugzilla.suse.com/1241214 | external |
| https://www.suse.com/security/cve/CVE-2025-32913 | external |
| https://bugzilla.suse.com/1241162 | external |
| https://www.suse.com/security/cve/CVE-2025-4948 | external |
| https://bugzilla.suse.com/1243332 | external |
| https://bugzilla.suse.com/1250562 | external |
| https://www.suse.com/security/cve/CVE-2025-4969 | external |
| https://bugzilla.suse.com/1243423 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsoup-2_4-1-2.74.3-11.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsoup-2_4-1-2.74.3-11.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15189",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15189-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:15189-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:15189-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4948 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4969 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4969/"
}
],
"title": "libsoup-2_4-1-2.74.3-11.1 on GA media",
"tracking": {
"current_release_date": "2025-06-01T00:00:00Z",
"generator": {
"date": "2025-06-01T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15189-1",
"initial_release_date": "2025-06-01T00:00:00Z",
"revision_history": [
{
"date": "2025-06-01T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsoup-2_4-1-2.74.3-11.1.aarch64",
"product": {
"name": "libsoup-2_4-1-2.74.3-11.1.aarch64",
"product_id": "libsoup-2_4-1-2.74.3-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"product": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"product_id": "libsoup-2_4-1-32bit-2.74.3-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-2.74.3-11.1.aarch64",
"product": {
"name": "libsoup2-devel-2.74.3-11.1.aarch64",
"product_id": "libsoup2-devel-2.74.3-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"product": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"product_id": "libsoup2-devel-32bit-2.74.3-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoup2-lang-2.74.3-11.1.aarch64",
"product": {
"name": "libsoup2-lang-2.74.3-11.1.aarch64",
"product_id": "libsoup2-lang-2.74.3-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"product": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"product_id": "typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-2_4-1-2.74.3-11.1.ppc64le",
"product": {
"name": "libsoup-2_4-1-2.74.3-11.1.ppc64le",
"product_id": "libsoup-2_4-1-2.74.3-11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"product": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"product_id": "libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-2.74.3-11.1.ppc64le",
"product": {
"name": "libsoup2-devel-2.74.3-11.1.ppc64le",
"product_id": "libsoup2-devel-2.74.3-11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"product": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"product_id": "libsoup2-devel-32bit-2.74.3-11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoup2-lang-2.74.3-11.1.ppc64le",
"product": {
"name": "libsoup2-lang-2.74.3-11.1.ppc64le",
"product_id": "libsoup2-lang-2.74.3-11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"product": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"product_id": "typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-2_4-1-2.74.3-11.1.s390x",
"product": {
"name": "libsoup-2_4-1-2.74.3-11.1.s390x",
"product_id": "libsoup-2_4-1-2.74.3-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"product": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"product_id": "libsoup-2_4-1-32bit-2.74.3-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-2.74.3-11.1.s390x",
"product": {
"name": "libsoup2-devel-2.74.3-11.1.s390x",
"product_id": "libsoup2-devel-2.74.3-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-32bit-2.74.3-11.1.s390x",
"product": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.s390x",
"product_id": "libsoup2-devel-32bit-2.74.3-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoup2-lang-2.74.3-11.1.s390x",
"product": {
"name": "libsoup2-lang-2.74.3-11.1.s390x",
"product_id": "libsoup2-lang-2.74.3-11.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"product": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"product_id": "typelib-1_0-Soup-2_4-2.74.3-11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsoup-2_4-1-2.74.3-11.1.x86_64",
"product": {
"name": "libsoup-2_4-1-2.74.3-11.1.x86_64",
"product_id": "libsoup-2_4-1-2.74.3-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"product": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"product_id": "libsoup-2_4-1-32bit-2.74.3-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-2.74.3-11.1.x86_64",
"product": {
"name": "libsoup2-devel-2.74.3-11.1.x86_64",
"product_id": "libsoup2-devel-2.74.3-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"product": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"product_id": "libsoup2-devel-32bit-2.74.3-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoup2-lang-2.74.3-11.1.x86_64",
"product": {
"name": "libsoup2-lang-2.74.3-11.1.x86_64",
"product_id": "libsoup2-lang-2.74.3-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64",
"product": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64",
"product_id": "typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64"
},
"product_reference": "libsoup-2_4-1-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le"
},
"product_reference": "libsoup-2_4-1-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x"
},
"product_reference": "libsoup-2_4-1-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64"
},
"product_reference": "libsoup-2_4-1-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64"
},
"product_reference": "libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le"
},
"product_reference": "libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x"
},
"product_reference": "libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup-2_4-1-32bit-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64"
},
"product_reference": "libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64"
},
"product_reference": "libsoup2-devel-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le"
},
"product_reference": "libsoup2-devel-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x"
},
"product_reference": "libsoup2-devel-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64"
},
"product_reference": "libsoup2-devel-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64"
},
"product_reference": "libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le"
},
"product_reference": "libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x"
},
"product_reference": "libsoup2-devel-32bit-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-devel-32bit-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64"
},
"product_reference": "libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-lang-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64"
},
"product_reference": "libsoup2-lang-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-lang-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le"
},
"product_reference": "libsoup2-lang-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-lang-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x"
},
"product_reference": "libsoup2-lang-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoup2-lang-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64"
},
"product_reference": "libsoup2-lang-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64"
},
"product_reference": "typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le"
},
"product_reference": "typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x"
},
"product_reference": "typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
},
"product_reference": "typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-32906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32906"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32906",
"url": "https://www.suse.com/security/cve/CVE-2025-32906"
},
{
"category": "external",
"summary": "SUSE Bug 1241263 for CVE-2025-32906",
"url": "https://bugzilla.suse.com/1241263"
},
{
"category": "external",
"summary": "SUSE Bug 1250562 for CVE-2025-32906",
"url": "https://bugzilla.suse.com/1250562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-32906"
},
{
"cve": "CVE-2025-32909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32909"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32909",
"url": "https://www.suse.com/security/cve/CVE-2025-32909"
},
{
"category": "external",
"summary": "SUSE Bug 1241226 for CVE-2025-32909",
"url": "https://bugzilla.suse.com/1241226"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-32909"
},
{
"cve": "CVE-2025-32910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32910"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32910",
"url": "https://www.suse.com/security/cve/CVE-2025-32910"
},
{
"category": "external",
"summary": "SUSE Bug 1241252 for CVE-2025-32910",
"url": "https://bugzilla.suse.com/1241252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-32910"
},
{
"cve": "CVE-2025-32912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32912"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32912",
"url": "https://www.suse.com/security/cve/CVE-2025-32912"
},
{
"category": "external",
"summary": "SUSE Bug 1241214 for CVE-2025-32912",
"url": "https://bugzilla.suse.com/1241214"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-32912"
},
{
"cve": "CVE-2025-32913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32913"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32913",
"url": "https://www.suse.com/security/cve/CVE-2025-32913"
},
{
"category": "external",
"summary": "SUSE Bug 1241162 for CVE-2025-32913",
"url": "https://bugzilla.suse.com/1241162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-32913"
},
{
"cve": "CVE-2025-4948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4948"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4948",
"url": "https://www.suse.com/security/cve/CVE-2025-4948"
},
{
"category": "external",
"summary": "SUSE Bug 1243332 for CVE-2025-4948",
"url": "https://bugzilla.suse.com/1243332"
},
{
"category": "external",
"summary": "SUSE Bug 1250562 for CVE-2025-4948",
"url": "https://bugzilla.suse.com/1250562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-4948"
},
{
"cve": "CVE-2025-4969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4969"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4969",
"url": "https://www.suse.com/security/cve/CVE-2025-4969"
},
{
"category": "external",
"summary": "SUSE Bug 1243423 for CVE-2025-4969",
"url": "https://bugzilla.suse.com/1243423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-01T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-4969"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.