Bug 2361962 (CVE-2025-46421)

Summary: CVE-2025-46421 libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2361966, 2361968, 2361969    
Bug Blocks:    

Description OSIDB Bzimport 2025-04-24 01:38:31 UTC
When encountering an HTTP redirect, libsoup  clients prior to version 3.6.5 send the HTTP Authorization header to  the host that is the target of the redirection, allowing this host to  impersonate the user to the host that performed the redirect.

Comment 3 errata-xmlrpc 2025-05-05 01:15:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:4439 https://access.redhat.com/errata/RHSA-2025:4439

Comment 4 errata-xmlrpc 2025-05-05 01:20:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:4440 https://access.redhat.com/errata/RHSA-2025:4440

Comment 5 errata-xmlrpc 2025-05-06 07:07:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:4508 https://access.redhat.com/errata/RHSA-2025:4508

Comment 6 errata-xmlrpc 2025-05-06 13:50:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:4538 https://access.redhat.com/errata/RHSA-2025:4538

Comment 7 errata-xmlrpc 2025-05-06 15:32:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:4560 https://access.redhat.com/errata/RHSA-2025:4560

Comment 8 errata-xmlrpc 2025-05-06 16:40:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:4568 https://access.redhat.com/errata/RHSA-2025:4568

Comment 9 errata-xmlrpc 2025-05-07 04:25:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:4609 https://access.redhat.com/errata/RHSA-2025:4609

Comment 10 errata-xmlrpc 2025-05-07 06:47:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:4624 https://access.redhat.com/errata/RHSA-2025:4624

Comment 11 errata-xmlrpc 2025-05-13 11:57:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7436 https://access.redhat.com/errata/RHSA-2025:7436

Comment 12 errata-xmlrpc 2025-05-13 16:00:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:7505 https://access.redhat.com/errata/RHSA-2025:7505