First published: Mon Apr 14 2025(Updated: )
A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libsoup | <3.6.5 | |
debian/libsoup2.4 | <=2.72.0-2<=2.74.3-1+deb12u1<=2.74.3-10 | 2.72.0-2+deb11u2 2.74.3-10.1 |
debian/libsoup3 | <=3.2.2-2 | 3.6.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32906 has a medium severity level due to its potential to cause HTTP server crashes.
To fix CVE-2025-32906, upgrade libsoup to version 3.6.5 or later.
libsoup versions prior to 3.6.5 are affected by CVE-2025-32906.
A specially crafted HTTP request can exploit CVE-2025-32906 to trigger an out-of-bounds read.
The impact of CVE-2025-32906 on your server could lead to crashes and downtime.