We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
Reserved 2025-05-19 | Published 2025-05-19 | Updated 2025-06-04 | Assigner redhatInteger Underflow (Wrap or Wraparound)
2025-05-19: | Reported to Red Hat. |
2025-05-19: | Made public. |
Red Hat would like to thank fouzhe and zkbytes for reporting this issue.
access.redhat.com/errata/RHSA-2025:8126 (RHSA-2025:8126)
access.redhat.com/errata/RHSA-2025:8128 (RHSA-2025:8128)
access.redhat.com/errata/RHSA-2025:8132 (RHSA-2025:8132)
access.redhat.com/errata/RHSA-2025:8139 (RHSA-2025:8139)
access.redhat.com/errata/RHSA-2025:8140 (RHSA-2025:8140)
access.redhat.com/errata/RHSA-2025:8252 (RHSA-2025:8252)
access.redhat.com/errata/RHSA-2025:8480 (RHSA-2025:8480)
access.redhat.com/errata/RHSA-2025:8481 (RHSA-2025:8481)
access.redhat.com/errata/RHSA-2025:8482 (RHSA-2025:8482)
access.redhat.com/security/cve/CVE-2025-4948
bugzilla.redhat.com/show_bug.cgi?id=2367183 (RHBZ#2367183)
Support options