{"id":"USN-7490-3","summary":"libsoup3 vulnerabilities","details":"USN-7490-1 fixed vulnerabilities in libsoup2.4. This update provides the\ncorresponding updates for libsoup3.\n\nOriginal advisory details:\n\n Tan Wei Chong discovered that libsoup incorrectly handled memory when\n parsing HTTP request headers. An attacker could possibly use this issue to\n send a maliciously crafted HTTP request to the server, causing a denial of\n service. (CVE-2025-32906)\n \n Alon Zahavi discovered that libsoup incorrectly parsed video files. An\n attacker could possibly use this issue to send a maliciously crafted HTTP\n response back to the client, causing a denial of service, or leading to\n undefined behavior. (CVE-2025-32909)\n \n Jan Różański discovered that libsoup incorrectly handled memory when\n parsing authentication headers. An attacker could possibly use this issue\n to send a maliciously crafted HTTP response back to the client, causing a\n denial of service. (CVE-2025-32910, CVE-2025-32912)\n \n It was discovered that libsoup incorrectly handled data in the hash table\n data type. An attacker could possibly use this issue to send a maliciously\n crafted HTTP request to the server, causing a denial of service or remote\n code execution. (CVE-2025-32911)\n \n Jan Różański discovered that libsoup incorrectly handled memory when\n parsing the content disposition HTTP header. An attacker could possibly\n use this issue to send maliciously crafted data to a client or server,\n causing a denial of service. (CVE-2025-32913)\n \n Alon Zahavi discovered that libsoup incorrectly handled memory when\n parsing HTTP requests. An attacker could possibly use this issue to send a\n maliciously crafted HTTP request to the server, causing a denial of\n service or obtaining sensitive information. (CVE-2025-32914)\n \n It was discovered that libsoup incorrectly handled memory when parsing\n quality-list headers. An attacker could possibly use this issue to send a\n maliciously crafted HTTP request to the server, causing a denial of\n service. (CVE-2025-46420)\n \n Jan Różański discovered that libsoup did not strip authorization\n information upon redirects. An attacker could possibly use this issue to\n obtain sensitive information. (CVE-2025-46421)\n","modified":"2026-02-10T04:48:35Z","published":"2025-05-07T12:18:50Z","related":["UBUNTU-CVE-2025-32906","UBUNTU-CVE-2025-32909","UBUNTU-CVE-2025-32910","UBUNTU-CVE-2025-32911","UBUNTU-CVE-2025-32912","UBUNTU-CVE-2025-32913","UBUNTU-CVE-2025-32914","UBUNTU-CVE-2025-46420","UBUNTU-CVE-2025-46421"],"upstream":["CVE-2025-32906","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32912","CVE-2025-32913","CVE-2025-32914","CVE-2025-46420","CVE-2025-46421","UBUNTU-CVE-2025-32906","UBUNTU-CVE-2025-32909","UBUNTU-CVE-2025-32910","UBUNTU-CVE-2025-32911","UBUNTU-CVE-2025-32912","UBUNTU-CVE-2025-32913","UBUNTU-CVE-2025-32914","UBUNTU-CVE-2025-46420","UBUNTU-CVE-2025-46421"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7490-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32906"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32909"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32910"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32911"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32912"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32913"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32914"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-46420"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-46421"}],"affected":[{"package":{"name":"libsoup3","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/libsoup3@3.0.7-0ubuntu1+esm3?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.7-0ubuntu1+esm3"}]}],"versions":["3.0.4-2","3.0.4-3","3.0.5-1","3.0.7-0ubuntu1","3.0.7-0ubuntu1+esm1","3.0.7-0ubuntu1+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-soup-3.0","binary_version":"3.0.7-0ubuntu1+esm3"},{"binary_name":"libsoup-3.0-0","binary_version":"3.0.7-0ubuntu1+esm3"},{"binary_name":"libsoup-3.0-common","binary_version":"3.0.7-0ubuntu1+esm3"},{"binary_name":"libsoup-3.0-dev","binary_version":"3.0.7-0ubuntu1+esm3"},{"binary_name":"libsoup-3.0-tests","binary_version":"3.0.7-0ubuntu1+esm3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2025-32906","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32909","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32910","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32911","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32912","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32913","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32914","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-46420","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-46421","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7490-3.json"}},{"package":{"name":"libsoup3","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/libsoup3@3.4.4-5ubuntu0.3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4.4-5ubuntu0.3"}]}],"versions":["3.4.2-4","3.4.4-1","3.4.4-2","3.4.4-4","3.4.4-5","3.4.4-5build1","3.4.4-5build2","3.4.4-5ubuntu0.1","3.4.4-5ubuntu0.2"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-soup-3.0","binary_version":"3.4.4-5ubuntu0.3"},{"binary_name":"libsoup-3.0-0","binary_version":"3.4.4-5ubuntu0.3"},{"binary_name":"libsoup-3.0-common","binary_version":"3.4.4-5ubuntu0.3"},{"binary_name":"libsoup-3.0-dev","binary_version":"3.4.4-5ubuntu0.3"},{"binary_name":"libsoup-3.0-tests","binary_version":"3.4.4-5ubuntu0.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2025-32906","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32909","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32910","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32911","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32912","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32913","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32914","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-46420","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-46421","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7490-3.json"}}],"schema_version":"1.7.3"}