Your message dated Tue, 16 Dec 2025 14:42:33 +0000
with message-id <[email protected]>
and subject line Bug#1118783: fixed in libsoup3 3.6.5-6
has caused the Debian Bug report #1118783,
regarding libsoup3: CVE-2025-12105
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1118783: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118783
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libsoup3
Version: 3.6.5-4
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 3.6.5-3
Hi,
The following vulnerability was published for libsoup3.
CVE-2025-12105[0]:
| A flaw was found in the asynchronous message queue handling of the
| libsoup library, widely used by GNOME and WebKit-based applications
| to manage HTTP/2 communications. When network operations are aborted
| at specific timing intervals, an internal message queue item may be
| freed twice due to missing state synchronization. This leads to a
| use-after-free memory access, potentially crashing the affected
| application. Attackers could exploit this behavior remotely by
| triggering specific HTTP/2 read and cancel sequences, resulting in a
| denial-of-service condition.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-12105
https://www.cve.org/CVERecord?id=CVE-2025-12105
[1] https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
[2]
https://gitlab.gnome.org/GNOME/libsoup/-/commit/9ba1243a24e442fa5ec44684617a4480027da960
Please adjust the affected versions in the BTS as needed.
I have not filled yet a second bug as well against src:libsoup2.4, I'm
not certain the issue is there as the code has seen major refactoring
adding run_until_read_done().
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: libsoup3
Source-Version: 3.6.5-6
Done: Jeremy Bícha <[email protected]>
We believe that the bug you reported is fixed in the latest version of
libsoup3, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jeremy Bícha <[email protected]> (supplier of updated libsoup3 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 16 Dec 2025 09:35:43 -0500
Source: libsoup3
Built-For-Profiles: noudeb
Architecture: source
Version: 3.6.5-6
Distribution: unstable
Urgency: high
Maintainer: Debian GNOME Maintainers
<[email protected]>
Changed-By: Jeremy Bícha <[email protected]>
Closes: 1118783
Changes:
libsoup3 (3.6.5-6) unstable; urgency=high
.
[ Hlib Korzhynskyy ]
* SECURITY UPDATE: Use after free in HTTP/2 queues
- debian/patches/CVE-2025-12105.patch: Add SOUP_MESSAGE_FINISHED checks in
libsoup/soup-session.c
- CVE-2025-12105 (Closes: #1118783)
.
[ Jeremy Bícha ]
* Override dh_gnome to avoid build log warnings
* Remove obsolete dh_gnome_clean override
* Remove unnecessary Priority: optional field
Checksums-Sha1:
81fa71c7725a9ecbd6c87fc6858edd4e54c770e7 3024 libsoup3_3.6.5-6.dsc
05fb917f6d5f09dc4e9e19ea51b06b0ca6331816 42288 libsoup3_3.6.5-6.debian.tar.xz
4594a1dde6ff0a7195bc54e1c775ad17bd5480ac 14333
libsoup3_3.6.5-6_source.buildinfo
Checksums-Sha256:
0ac7ed14552ae3514dbf9d6ef6e38e4c5be2520e881bbbf86bcbe81a6b97e237 3024
libsoup3_3.6.5-6.dsc
8a75f43e82f5c1f8a19feeca9ca54dafc3f593d445058f162b7330f52c136ccb 42288
libsoup3_3.6.5-6.debian.tar.xz
6c16658a0fe3071741a1d1b8645e3aa0c5c68a99d04a5cdf9286d1191c2529dc 14333
libsoup3_3.6.5-6_source.buildinfo
Files:
9bac83ef4a593fba113750ca5afdcc7a 3024 devel optional libsoup3_3.6.5-6.dsc
a046a11bb7e17cd47ec614a0b12897e2 42288 devel optional
libsoup3_3.6.5-6.debian.tar.xz
b13c6edbf31e9df73a5ab06e9e296f5d 14333 devel optional
libsoup3_3.6.5-6_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Qswc
-----END PGP SIGNATURE-----
pgpfB5tlsMBHg.pgp
Description: PGP signature
--- End Message ---