rpm package
suse/libsoup&distro=SUSE Manager Proxy 4.3
pkg:rpm/suse/libsoup&distro=SUSE%20Manager%20Proxy%204.3
Vulnerabilities (20)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-4969 | Med | 6.5 | < 3.0.4-150400.3.10.1 | 3.0.4-150400.3.10.1 | May 21, 2025 | A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond | |
| CVE-2025-4948 | Hig | 7.5 | < 3.0.4-150400.3.10.1 | 3.0.4-150400.3.10.1 | May 19, 2025 | A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper v | |
| CVE-2025-4476 | Med | 4.3 | < 3.0.4-150400.3.10.1 | 3.0.4-150400.3.10.1 | May 16, 2025 | A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing | |
| CVE-2025-46421 | Med | 6.8 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 24, 2025 | A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect. | |
| CVE-2025-46420 | Med | 6.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 24, 2025 | A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes. | |
| CVE-2025-32914 | Hig | 7.4 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. | |
| CVE-2025-32912 | Med | 6.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash. | |
| CVE-2025-32910 | Med | 6.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. | |
| CVE-2025-32909 | Med | 5.3 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash. | |
| CVE-2025-32913 | Hig | 7.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function. | |
| CVE-2025-32907 | Med | 5.3 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does n | |
| CVE-2025-32906 | Hig | 7.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 14, 2025 | A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. | |
| CVE-2025-32053 | Med | 6.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 3, 2025 | A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read. | |
| CVE-2025-32052 | Med | 6.5 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 3, 2025 | A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. | |
| CVE-2025-32051 | Med | 5.9 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 3, 2025 | A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS). | |
| CVE-2025-32050 | Med | 5.9 | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 3, 2025 | A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read. | |
| CVE-2025-2784 | — | < 3.0.4-150400.3.7.1 | 3.0.4-150400.3.7.1 | Apr 3, 2025 | A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server. | ||
| CVE-2024-52532 | — | < 3.0.4-150400.3.3.1 | 3.0.4-150400.3.3.1 | Nov 11, 2024 | GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. | ||
| CVE-2024-52531 | — | < 3.0.4-150400.3.3.1 | 3.0.4-150400.3.3.1 | Nov 11, 2024 | GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the co | ||
| CVE-2024-52530 | — | < 3.0.4-150400.3.3.1 | 3.0.4-150400.3.3.1 | Nov 11, 2024 | GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header. |
- affected < 3.0.4-150400.3.10.1fixed 3.0.4-150400.3.10.1
A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond
- affected < 3.0.4-150400.3.10.1fixed 3.0.4-150400.3.10.1
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper v
- affected < 3.0.4-150400.3.10.1fixed 3.0.4-150400.3.10.1
A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does n
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS).
- affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.
- CVE-2025-2784Apr 3, 2025affected < 3.0.4-150400.3.7.1fixed 3.0.4-150400.3.7.1
A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.
- CVE-2024-52532Nov 11, 2024affected < 3.0.4-150400.3.3.1fixed 3.0.4-150400.3.3.1
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
- CVE-2024-52531Nov 11, 2024affected < 3.0.4-150400.3.3.1fixed 3.0.4-150400.3.3.1
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the co
- CVE-2024-52530Nov 11, 2024affected < 3.0.4-150400.3.3.1fixed 3.0.4-150400.3.3.1
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.