The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
- libsoup: Integer overflow in appendparamquoted (CVE-2025-32050)
- libsoup: Heap buffer overflow in sniff_unknown() (CVE-2025-32052)
- libsoup: Heap buffer overflows in snifffeedorhtml() and skipinsignificant_space() (CVE-2025-32053)
- libsoup: Out of bounds reads in soupheadersparse_request() (CVE-2025-32906)
- libsoup: Double free on soupmessageheadersgetcontent_disposition() through "soup-message-headers.c" via "params" GHashTable value (CVE-2025-32911)
- libsoup: NULL pointer dereference in soupmessageheadersgetcontent_disposition when "filename" parameter is present, but has no value in Content-Disposition header (CVE-2025-32913)
- libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server (CVE-2025-46421)
- libsoup: Memory leak on soupheaderparsequalitylist() via soup-headers.c (CVE-2025-46420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.