Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
Summary
| CVE | CVE-2025-32914 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-04-14 15:15:25 UTC |
| Updated | 2026-04-22 11:16:02 UTC |
| Description | A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. |
Risk And Classification
Primary CVSS: v3.1 7.4 HIGH from [email protected]
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Problem Types: CWE-125 | CWE-125 Out-of-bounds Read
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 7.4 | HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
| 3.1 | CNA | CVSS | 7.4 | HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
HighCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Red Hat | Red Hat Enterprise Linux 10 | unaffected 0:3.6.5-3.el10_0 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support | unaffected 0:2.62.2-9.el7_9 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support | unaffected 0:2.62.2-6.el7_9 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:2.62.3-9.el8_10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:2.62.3-9.el8_10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | unaffected 0:2.62.3-1.el8_2.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | unaffected 0:2.62.3-2.el8_4.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | unaffected 0:2.62.3-2.el8_6.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | unaffected 0:2.62.3-2.el8_6.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions | unaffected 0:2.62.3-2.el8_6.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | unaffected 0:2.62.3-3.el8_8.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:2.72.0-10.el9_6.2 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions | unaffected 0:2.72.0-8.el9_0.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | unaffected 0:2.72.0-8.el9_2.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | unaffected 0:2.72.0-8.el9_4.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 6 | Not specified | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| lists.debian.org/debian-lts-announce/2025/04/msg00036.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| access.redhat.com/errata/RHSA-2025:9179 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8252 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8481 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8140 | [email protected] | access.redhat.com | |
| gitlab.gnome.org/GNOME/libsoup/-/issues/436 | [email protected] | gitlab.gnome.org | |
| access.redhat.com/errata/RHSA-2025:8126 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8482 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8663 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:21657 | [email protected] | access.redhat.com | |
| access.redhat.com/security/cve/CVE-2025-32914 | [email protected] | access.redhat.com | |
| bugzilla.redhat.com/show_bug.cgi | [email protected] | bugzilla.redhat.com | |
| access.redhat.com/errata/RHSA-2025:7505 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8132 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8480 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:8139 | [email protected] | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2025-04-14T01:21:01.384Z | Reported to Red Hat. |
| CNA | 2025-04-14T00:00:00.000Z | Made public. |
Workarounds
CNA: Currently, no mitigation is available for this vulnerability.
There are currently no legacy QID mappings associated with this CVE.