Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-4140-1 | libsoup2.4 security update | 
|  EUVD | EUVD-2025-10898 | A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. | 
|  Ubuntu USN | USN-7490-1 | libsoup vulnerabilities | 
|  Ubuntu USN | USN-7490-3 | libsoup vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
Currently, no mitigation was found for this vulnerability.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 17 Jun 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Els | |
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products | Redhat rhel Els | |
| References |  | 
Thu, 29 May 2025 07:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8::crb | |
| References |  | 
Wed, 14 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 | 
Tue, 13 May 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| References |  | 
Tue, 13 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream | |
| References |  | 
Wed, 07 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:enterprise_linux:8 | 
Wed, 07 May 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Tus | |
| CPEs | cpe:/a:redhat:rhel_aus:8.4::appstream cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/a:redhat:rhel_e4s:8.4::appstream cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_tus:8.4::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_aus:8.4::baseos cpe:/o:redhat:rhel_aus:8.6::baseos cpe:/o:redhat:rhel_e4s:8.4::baseos cpe:/o:redhat:rhel_e4s:8.6::baseos cpe:/o:redhat:rhel_tus:8.4::baseos cpe:/o:redhat:rhel_tus:8.6::baseos | |
| Vendors & Products | Redhat rhel Tus | |
| References |  | 
Tue, 06 May 2025 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:rhel_eus:8.8::appstream cpe:/a:redhat:rhel_eus:9.2::appstream cpe:/o:redhat:enterprise_linux:8::baseos cpe:/o:redhat:rhel_eus:8.8::baseos | |
| References |  | 
Tue, 06 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Aus | |
| CPEs | cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/o:redhat:rhel_aus:8.2::baseos | |
| Vendors & Products | Redhat rhel Aus | |
| References |  | 
Mon, 05 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.4 | 
Mon, 05 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Eus | |
| CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream | |
| Vendors & Products | Redhat rhel Eus | |
| References |  | 
Mon, 05 May 2025 02:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel E4s | |
| CPEs | cpe:/a:redhat:rhel_e4s:9.0::appstream | |
| Vendors & Products | Redhat rhel E4s | |
| References |  | 
Tue, 15 Apr 2025 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Mon, 14 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 14 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. | |
| Title | Libsoup: out of bounds reads in soup_headers_parse_request() | |
| First Time appeared | Redhat Redhat enterprise Linux | |
| Weaknesses | CWE-125 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | |
| References |  | |
| Metrics | cvssV3_1 
 | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-07-29T00:25:03.495Z
Reserved: 2025-04-14T01:37:48.152Z
Link: CVE-2025-32906
Updated: 2025-04-14T14:13:53.091Z
Status : Awaiting Analysis
Published: 2025-04-14T14:15:24.433
Modified: 2025-06-17T12:15:24.950
Link: CVE-2025-32906
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.