Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4948

Опубликовано: 19 мая 2025
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.

Отчет

The Red Hat Product Security team has assessed the severity of this vulnerability as High, given that it can be remotely triggered without authentication or user interaction. Successful exploitation allows an attacker to crash services or applications relying on libsoup for HTTP multipart message processing. The vulnerability’s root cause is a lack of proper bounds checking that results in an integer underflow and subsequent denial-of-service.

Меры по смягчению последствий

To mitigate this issue, Red Hat recommends avoiding the use of libsoup with untrusted or unauthenticated multipart HTTP message sources until updated packages are available. Administrators can deploy application-level filters or HTTP proxies that reject malformed multipart requests. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this integer underflow vulnerability and restore the stability of affected services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libsoupOut of support scope
Red Hat Enterprise Linux 7libsoupAffected
Red Hat Enterprise Linux 10libsoup3FixedRHSA-2025:812826.05.2025
Red Hat Enterprise Linux 8libsoupFixedRHSA-2025:813226.05.2025
Red Hat Enterprise Linux 8libsoupFixedRHSA-2025:813226.05.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportlibsoupFixedRHSA-2025:848004.06.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportlibsoupFixedRHSA-2025:866309.06.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportlibsoupFixedRHSA-2025:848204.06.2025
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicelibsoupFixedRHSA-2025:848204.06.2025
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionslibsoupFixedRHSA-2025:848204.06.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-191
https://bugzilla.redhat.com/show_bug.cgi?id=2367183libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.

CVSS3: 7.5
nvd
около 1 месяца назад

A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.

CVSS3: 7.5
debian
около 1 месяца назад

A flaw was found in the soup_multipart_new_from_message() function of ...

CVSS3: 7.5
github
около 1 месяца назад

A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.

suse-cvrf
14 дней назад

Security update for libsoup

7.5 High

CVSS3