| Package | libsoup2.4 |
|---|---|
| Version | 2.56.0-2+deb9u5 (stretch), 2.64.2-2+deb10u3 (buster) |
| Related CVEs | CVE-2025-4476 CVE-2025-4945 CVE-2025-4948 CVE-2025-4969 |
Several vulnerabilities have been found in libsoup2.4.
libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop, to integrate well with GNOME applications.
CVE-2025-4945: integer overflow in cookie parsing.
A flaw was found in the cookie parsing logic of the libsoup HTTP
library, used in GNOME applications and other software. The
vulnerability arises when processing the expiration date of cookies,
where a specially crafted value can trigger an integer overflow. This
may result in undefined behavior, allowing an attacker to bypass cookie
expiration logic, causing persistent or unintended cookie behavior. The
issue stems from improper validation of large integer inputs during date
arithmetic operations within the cookie parsing routines.
CVE-2025-4476: crash in soup_auth_digest_get_protection_space.
A denial-of-service vulnerability has been identified in the libsoup
HTTP client library. This flaw can be triggered when a libsoup client
receives a 401 (Unauthorized) HTTP response containing a specifically
crafted domain parameter within the WWW-Authenticate header. Processing
this malformed header can lead to a crash of the client application
using libsoup. An attacker could exploit this by setting up a malicious
HTTP server. If a user's application using the vulnerable libsoup
library connects to this malicious server, it could result in a
denial-of-service. Successful exploitation requires tricking a user's
client application into connecting to the attacker's malicious server.
CVE-2025-4948: verify boundary limits for multipart body.
A flaw was found in the soup_multipart_new_from_message() function of
the libsoup HTTP library, which is commonly used by GNOME and other
applications to handle web communications. The issue occurs when the
library processes specially crafted multipart messages. Due to improper
validation, an internal calculation can go wrong, leading to an integer
underflow. This can cause the program to access invalid memory and
crash. As a result, any application or server using libsoup could be
forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
CVE-2025-4969: verify array bounds before accessing.
A vulnerability was found in the libsoup package. This flaw stems from
its failure to correctly verify the termination of multipart HTTP
messages. This can allow a remote attacker to send a specially crafted
multipart HTTP body, causing the libsoup-consuming server to read beyond
its allocated memory boundaries (out-of-bounds read).
For Debian 10 buster, these problems have been fixed in version 2.64.2-2+deb10u3.
For Debian 9 stretch, these problems have been fixed in version 2.56.0-2+deb9u5.
We recommend that you upgrade your libsoup2.4 packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.