First published: Wed Feb 05 2025(Updated: )
Important: libsoup security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libsoup | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debuginfo | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debuginfo | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debugsource | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debugsource | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-devel | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-devel | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debuginfo | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-debugsource | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup-devel | <2.62.3-3.el8_8.2 | 2.62.3-3.el8_8.2 |
redhat/libsoup | <2.62.3-3.el8_8.2.aa | 2.62.3-3.el8_8.2.aa |
redhat/libsoup-debuginfo | <2.62.3-3.el8_8.2.aa | 2.62.3-3.el8_8.2.aa |
redhat/libsoup-debugsource | <2.62.3-3.el8_8.2.aa | 2.62.3-3.el8_8.2.aa |
redhat/libsoup-devel | <2.62.3-3.el8_8.2.aa | 2.62.3-3.el8_8.2.aa |
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1075 is classified as important.
RHSA-2025:1075 addresses a buffer overflow vulnerability via UTF-8 conversion in libsoup (CVE-2024-52531).
To fix RHSA-2025:1075, update libsoup to version 2.62.3-3.el8_8.2.
RHSA-2025:1075 affects Red Hat Enterprise Linux Server versions and other related variants that utilize the libsoup package.
Yes, exploitation of the vulnerability in RHSA-2025:1075 could lead to unauthorized access and potential system compromise.