Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-4140-1 | libsoup2.4 security update | 
|  EUVD | EUVD-2025-10884 | A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. | 
|  Ubuntu USN | USN-7490-1 | libsoup vulnerabilities | 
|  Ubuntu USN | USN-7490-3 | libsoup vulnerabilities | 
|  Ubuntu USN | USN-7643-1 | libsoup vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
Currently, no mitigation is available for this vulnerability.
Tue, 17 Jun 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Els | |
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products | Redhat rhel Els | |
| References |  | 
Tue, 10 Jun 2025 06:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.4 | 
Mon, 09 Jun 2025 10:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.4::appstream cpe:/o:redhat:rhel_aus:8.4::baseos | |
| References |  | 
Fri, 06 Jun 2025 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_tus:8.6 | 
Wed, 04 Jun 2025 04:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Tus | |
| CPEs | cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_aus:8.6::baseos cpe:/o:redhat:rhel_e4s:8.6::baseos cpe:/o:redhat:rhel_tus:8.6::baseos | |
| Vendors & Products | Redhat rhel Tus | |
| References |  | 
Wed, 04 Jun 2025 04:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Aus Redhat rhel E4s | |
| CPEs | cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/a:redhat:rhel_e4s:9.0::appstream cpe:/o:redhat:rhel_aus:8.2::baseos | |
| Vendors & Products | Redhat rhel Aus Redhat rhel E4s | |
| References |  | 
Wed, 28 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:8.8 | 
Wed, 28 May 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:8.8::appstream cpe:/o:redhat:rhel_eus:8.8::baseos | |
| References |  | 
Tue, 27 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhel_eus:9.2 cpe:/o:redhat:enterprise_linux:8 | 
Mon, 26 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.4 | 
Mon, 26 May 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:rhel_eus:9.2::appstream cpe:/o:redhat:enterprise_linux:8::baseos | |
| References |  | 
Mon, 26 May 2025 11:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Eus | |
| CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream | |
| Vendors & Products | Redhat rhel Eus | |
| References |  | 
Mon, 26 May 2025 07:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream | |
| References |  | 
Tue, 13 May 2025 23:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| References |  | 
Tue, 15 Apr 2025 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Mon, 14 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 14 Apr 2025 15:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. | |
| Title | Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process | |
| First Time appeared | Redhat Redhat enterprise Linux | |
| Weaknesses | CWE-125 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | |
| References |  | |
| Metrics | cvssV3_1 
 | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-07-29T07:23:35.068Z
Reserved: 2025-04-14T01:59:13.828Z
Link: CVE-2025-32914
Updated: 2025-04-14T15:05:27.780Z
Status : Awaiting Analysis
Published: 2025-04-14T15:15:25.633
Modified: 2025-06-17T12:15:25.657
Link: CVE-2025-32914
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.