CVE-2025-32051
Libsoup: segmentation fault when parsing malformed data uri
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS).
This update for libsoup fixes the following issues. Fixed heap buffer over-read in 'skip_insignificant_space' when sniffing conten. Fixed integer overflow in append_param_quoted. Fixed segmentation fault when parsing malformed data URI Fixed heap buffer overflow in sniff_unknown. Fixed heap buffer overflows in sniff_feed_or_html and skip_insignificant_space. Fixed out of bounds reads in soup_headers_parse_request. Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request. Fixed HTTP request may lead to server crash due to HTTP/2 server not fully validating the values of pseudo-headers. Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c. Fixed NULL pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication. Fixed double free on soup_message_headers_get_content_disposition via "params" Fixed NULL pointer dereference in SoupAuthDigest. Fixed NULL pointer dereference in soup_message_headers_get_content_disposition. Fixed out of bounds read in 'soup_multipart_new_from_message'. Fixed memory leak on soup_header_parse_quality_list via soup-headers.c. Fixed HTTP Authorization Header leak via an HTTP redirect.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-04-03 CVE Reserved
- 2025-04-03 CVE Published
- 2025-05-27 CVE Updated
- 2025-06-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/security/cve/CVE-2025-32051 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=2357068 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Red Hat Search vendor "Red Hat" | Enterprise Linux Search vendor "Red Hat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
|