Bug 2367183 (CVE-2025-4948)

Summary: CVE-2025-4948 libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2367188, 2367189, 2367190    
Bug Blocks:    

Description OSIDB Bzimport 2025-05-19 06:25:32 UTC
Integer Underflow (Wraparound) vulnerability in the multipart message parser of the libsoup HTTP library. The flaw is caused by an unsafe arithmetic operation in the soup_multipart_new_from_message() function. When a specially crafted multipart message is processed, the length calculation (end - 2 - split) can underflow, leading to invalid memory access and application crash. This can be exploited remotely without any authentication or user interaction, allowing attackers to disrupt the availability of applications or services using libsoup.

Comment 1 errata-xmlrpc 2025-05-26 06:40:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:8126 https://access.redhat.com/errata/RHSA-2025:8126

Comment 2 errata-xmlrpc 2025-05-26 06:58:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:8128 https://access.redhat.com/errata/RHSA-2025:8128

Comment 3 errata-xmlrpc 2025-05-26 08:44:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:8132 https://access.redhat.com/errata/RHSA-2025:8132

Comment 4 errata-xmlrpc 2025-05-26 10:53:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:8139 https://access.redhat.com/errata/RHSA-2025:8139

Comment 5 errata-xmlrpc 2025-05-26 11:05:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:8140 https://access.redhat.com/errata/RHSA-2025:8140

Comment 6 errata-xmlrpc 2025-05-28 07:58:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:8252 https://access.redhat.com/errata/RHSA-2025:8252

Comment 8 errata-xmlrpc 2025-06-04 03:31:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:8481 https://access.redhat.com/errata/RHSA-2025:8481

Comment 9 errata-xmlrpc 2025-06-04 03:38:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:8480 https://access.redhat.com/errata/RHSA-2025:8480

Comment 10 errata-xmlrpc 2025-06-04 03:40:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:8482 https://access.redhat.com/errata/RHSA-2025:8482