Home

Description

A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server.

PUBLISHED Reserved 2025-04-14 | Published 2025-04-15 | Updated 2025-11-18 | Assigner redhat




CRITICAL: 9.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

Free of Memory not on the Heap

Product status

Default status
unaffected

Any version before 3.6.3
affected

Default status
affected

0:2.62.2-9.el7_9 (rpm) before *
unaffected

Default status
affected

0:2.62.2-6.el7_9 (rpm) before *
unaffected

Default status
affected

0:2.62.3-8.el8_10 (rpm) before *
unaffected

Default status
affected

0:2.8-3.el8_10.1 (rpm) before *
unaffected

Default status
affected

0:8.10-1 (rpm) before *
unaffected

Default status
affected

0:2.62.3-8.el8_10 (rpm) before *
unaffected

Default status
affected

0:2.62.3-1.el8_2.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_4.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_4.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_4.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_6.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_6.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-2.el8_6.4 (rpm) before *
unaffected

Default status
affected

0:2.62.3-3.el8_8.4 (rpm) before *
unaffected

Default status
affected

0:2.72.0-10.el9_6.1 (rpm) before *
unaffected

Default status
affected

0:2.72.0-8.el9_0.4 (rpm) before *
unaffected

Default status
affected

0:2.72.0-8.el9_2.4 (rpm) before *
unaffected

Default status
affected

0:2.72.0-8.el9_4.4 (rpm) before *
unaffected

Default status
unaffected

Default status
unknown

Timeline

2025-04-14:Reported to Red Hat.
2025-04-14:Made public.

References

lists.debian.org/debian-lts-announce/2025/04/msg00036.html

access.redhat.com/errata/RHSA-2025:21657 (RHSA-2025:21657) vendor-advisory

access.redhat.com/errata/RHSA-2025:4439 (RHSA-2025:4439) vendor-advisory

access.redhat.com/errata/RHSA-2025:4440 (RHSA-2025:4440) vendor-advisory

access.redhat.com/errata/RHSA-2025:4508 (RHSA-2025:4508) vendor-advisory

access.redhat.com/errata/RHSA-2025:4538 (RHSA-2025:4538) vendor-advisory

access.redhat.com/errata/RHSA-2025:4560 (RHSA-2025:4560) vendor-advisory

access.redhat.com/errata/RHSA-2025:4568 (RHSA-2025:4568) vendor-advisory

access.redhat.com/errata/RHSA-2025:4609 (RHSA-2025:4609) vendor-advisory

access.redhat.com/errata/RHSA-2025:4624 (RHSA-2025:4624) vendor-advisory

access.redhat.com/errata/RHSA-2025:7436 (RHSA-2025:7436) vendor-advisory

access.redhat.com/errata/RHSA-2025:8292 (RHSA-2025:8292) vendor-advisory

access.redhat.com/errata/RHSA-2025:9179 (RHSA-2025:9179) vendor-advisory

access.redhat.com/security/cve/CVE-2025-32911 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2359355 (RHBZ#2359355) issue-tracking

cve.org (CVE-2025-32911)

nvd.nist.gov (CVE-2025-32911)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.