Source: libsoup2.4 Version: 2.74.3-10 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/issues/435 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libsoup2.4. CVE-2025-32913[0]: | A flaw was found in libsoup, where the | soup_message_headers_get_content_disposition() function is | vulnerable to a NULL pointer dereference. This flaw allows a | malicious HTTP peer to crash a libsoup client or server that uses | this function. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-32913 https://www.cve.org/CVERecord?id=CVE-2025-32913 [1] https://gitlab.gnome.org/GNOME/libsoup/-/issues/435 [2] https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/422 [3] https://gitlab.gnome.org/GNOME/libsoup/-/commit/f4a761fb66512fff59798765e8ac5b9e57dceef0 Please adjust the affected versions in the BTS as needed. Regards, Salvatore