The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
libsoup: Integer overflow in appendparamquoted (CVE-2025-32050)
libsoup: Heap buffer overflow in sniff_unknown() (CVE-2025-32052)
libsoup: Heap buffer overflows in snifffeedorhtml() and skipinsignificant_space() (CVE-2025-32053)
libsoup: Out of bounds reads in soupheadersparse_request() (CVE-2025-32906)
libsoup: Double free on soupmessageheadersgetcontent_disposition() through "soup-message-headers.c" via "params" GHashTable value (CVE-2025-32911)
libsoup: NULL pointer dereference in soupmessageheadersgetcontent_disposition when "filename" parameter is present, but has no value in Content-Disposition header (CVE-2025-32913)
libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server (CVE-2025-46421)
libsoup: Memory leak on soupheaderparsequalitylist() via soup-headers.c (CVE-2025-46420)
libsoup: Integer overflow in appendparamquoted [rhel-8.10.z] (CVE-2025-32050)
libsoup: Heap buffer overflow in sniff_unknown() [rhel-8.10.z] (CVE-2025-32052)
libsoup: Heap buffer overflows in snifffeedorhtml() and skipinsignificant_space() [rhel-8.10.z] (CVE-2025-32053)
libsoup: Out of bounds reads in soupheadersparse_request() [rhel-8.10.z] (CVE-2025-32906)
libsoup: Double free on soupmessageheadersgetcontent_disposition() through "soup-message-headers.c" via "params" GHashTable value [rhel-8.10.z] (CVE-2025-32911)
libsoup: NULL pointer dereference in soupmessageheadersgetcontent_disposition when "filename" parameter is present, but has no value in Content-Disposition header [rhel-8.10.z] (CVE-2025-32913)
libsoup: Memory leak on soupheaderparsequalitylist() via soup-headers.c [rhel-8.10.z] (CVE-2025-46420)
libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server [rhel-8.10.z] (CVE-2025-46421)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.