rpm package
almalinux/libsoup3-doc
pkg:rpm/almalinux/libsoup3-doc
Vulnerabilities (18)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-5119 | Med | 5.9 | < 3.6.5-3.el10_1.11 | 3.6.5-3.el10_1.11 | Mar 30, 2026 | A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leadi | |
| CVE-2026-4271 | Med | 5.3 | < 3.6.5-3.el10_1.11 | 3.6.5-3.el10_1.11 | Mar 17, 2026 | A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a Use-After-Free, occurs in the HTTP/2 server implementation. A remote attacker can exploit this by sending specially crafted HTTP/2 requests that cause authentication failures. This c | |
| CVE-2026-1761 | Hig | 8.6 | < 3.6.5-3.el10_1.9 | 3.6.5-3.el10_1.9 | Feb 2, 2026 | A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to m | |
| CVE-2026-0719 | Hig | 8.6 | < 3.6.5-3.el10_1.9 | 3.6.5-3.el10_1.9 | Jan 8, 2026 | A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This | |
| CVE-2025-14523 | Hig | 8.2 | < 3.6.5-3.el10_1.8 | 3.6.5-3.el10_1.8 | Dec 11, 2025 | A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to on | |
| CVE-2025-12105 | Hig | 7.5 | < 3.6.5-3.el10_1.7 | 3.6.5-3.el10_1.7 | Oct 23, 2025 | A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed tw | |
| CVE-2025-11021 | Hig | 7.5 | < 3.6.5-3.el10_0.7 | 3.6.5-3.el10_0.7 | Sep 26, 2025 | A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw coul | |
| CVE-2025-4945 | Low | 3.7 | < 3.6.5-3.el10_1.6 | 3.6.5-3.el10_1.6 | May 19, 2025 | A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in un | |
| CVE-2025-4948 | Hig | 7.5 | < 3.6.5-3.el10_0.6 | 3.6.5-3.el10_0.6 | May 19, 2025 | A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper v | |
| CVE-2025-4035 | Med | 4.3 | < 3.6.5-3.el10_0.6 | 3.6.5-3.el10_0.6 | Apr 29, 2025 | A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious | |
| CVE-2025-46421 | Med | 6.8 | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 24, 2025 | A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect. | |
| CVE-2025-32914 | Hig | 7.4 | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 14, 2025 | A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. | |
| CVE-2025-32912 | Med | 6.5 | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 14, 2025 | A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash. | |
| CVE-2025-32908 | Hig | 7.5 | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 14, 2025 | A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS). | |
| CVE-2025-32907 | Med | 5.3 | < 3.6.5-3.el10_0.6 | 3.6.5-3.el10_0.6 | Apr 14, 2025 | A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does n | |
| CVE-2025-32906 | Hig | 7.5 | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 14, 2025 | A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. | |
| CVE-2025-32049 | Hig | 7.5 | < 3.6.5-3.el10_0.6 | 3.6.5-3.el10_0.6 | Apr 3, 2025 | A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS). | |
| CVE-2025-2784 | — | < 3.6.5-3.el10_0 | 3.6.5-3.el10_0 | Apr 3, 2025 | A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server. |
- affected < 3.6.5-3.el10_1.11fixed 3.6.5-3.el10_1.11
A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leadi
- affected < 3.6.5-3.el10_1.11fixed 3.6.5-3.el10_1.11
A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a Use-After-Free, occurs in the HTTP/2 server implementation. A remote attacker can exploit this by sending specially crafted HTTP/2 requests that cause authentication failures. This c
- affected < 3.6.5-3.el10_1.9fixed 3.6.5-3.el10_1.9
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to m
- affected < 3.6.5-3.el10_1.9fixed 3.6.5-3.el10_1.9
A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This
- affected < 3.6.5-3.el10_1.8fixed 3.6.5-3.el10_1.8
A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to on
- affected < 3.6.5-3.el10_1.7fixed 3.6.5-3.el10_1.7
A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed tw
- affected < 3.6.5-3.el10_0.7fixed 3.6.5-3.el10_0.7
A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw coul
- affected < 3.6.5-3.el10_1.6fixed 3.6.5-3.el10_1.6
A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in un
- affected < 3.6.5-3.el10_0.6fixed 3.6.5-3.el10_0.6
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper v
- affected < 3.6.5-3.el10_0.6fixed 3.6.5-3.el10_0.6
A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious
- affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
- affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
- affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.
- affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS).
- affected < 3.6.5-3.el10_0.6fixed 3.6.5-3.el10_0.6
A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does n
- affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
- affected < 3.6.5-3.el10_0.6fixed 3.6.5-3.el10_0.6
A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
- CVE-2025-2784Apr 3, 2025affected < 3.6.5-3.el10_0fixed 3.6.5-3.el10_0
A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.