CVE-2025-4948
Public on
Last Modified:
Description
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
Statement
The Red Hat Product Security team has assessed the severity of this vulnerability as High, given that it can be remotely triggered without authentication or user interaction. Successful exploitation allows an attacker to crash services or applications relying on libsoup for HTTP multipart message processing. The vulnerability’s root cause is a lack of proper bounds checking that results in an integer underflow and subsequent denial-of-service.
Mitigation
To mitigate this issue, Red Hat recommends avoiding the use of libsoup with untrusted or unauthenticated multipart HTTP message sources until updated packages are available. Administrators can deploy application-level filters or HTTP proxies that reject malformed multipart requests. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this integer underflow vulnerability and restore the stability of affected services.
Additional Information
- This content is not included.Bugzilla 2367183: libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup
- Content from cwe.mitre.org is not included.CWE-191: Integer Underflow (Wrap or Wraparound)
- FAQ: Frequently asked questions about CVE-2025-4948
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.
External References
Content from www.cve.org is not included.https://www.cve.org/CVERecord?id=CVE-2025-4948
Content from nvd.nist.gov is not included.https://nvd.nist.gov/vuln/detail/CVE-2025-4948
Content from gitlab.gnome.org is not included.https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
Affected Packages and Issued Red Hat Security Errata
| Products / Services | Components | State | Errata |
|---|---|---|---|
| Red Hat Enterprise Linux 10 | libsoup3 | Fixed | RHSA-2025:8128 |
| Red Hat Enterprise Linux 6 | libsoup | Out of support scope | |
| Red Hat Enterprise Linux 7 Extended Lifecycle Support | libsoup | Fixed | RHSA-2025:21657 |
| Red Hat Enterprise Linux 7 Extended Lifecycle Support | libsoup | Fixed | RHSA-2025:9179 |
| Red Hat Enterprise Linux 8 | libsoup | Fixed | RHSA-2025:8132 |
| Red Hat Enterprise Linux 8.2 Advanced Update Support | libsoup | Fixed | RHSA-2025:8480 |
| Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | libsoup | Fixed | RHSA-2025:8663 |
| Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | libsoup | Fixed | RHSA-2025:8482 |
| Red Hat Enterprise Linux 8.6 Telecommunications Update Service | libsoup | Fixed | RHSA-2025:8482 |
| Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | libsoup | Fixed | RHSA-2025:8482 |
| Red Hat Enterprise Linux 8.8 Extended Update Support | libsoup | Fixed | RHSA-2025:8252 |
| Red Hat Enterprise Linux 9 | libsoup | Fixed | RHSA-2025:8126 |
| Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | libsoup | Fixed | RHSA-2025:8481 |
| Red Hat Enterprise Linux 9.2 Extended Update Support | libsoup | Fixed | RHSA-2025:8140 |
| Red Hat Enterprise Linux 9.4 Extended Update Support | libsoup | Fixed | RHSA-2025:8139 |
Common Vulnerability Scoring System (CVSS) Score Details
Important note
CVSS scores for open source components depend on vendor-specific factors (e.g. version or build chain). Therefore, Red Hat's score and impact rating can be different from NVD and other vendors. Red Hat remains the authoritative CVE Naming Authorities (CNA) source for its products and services (see Red Hat classifications ).
| CVSS v3 Score Breakdown | Red Hat | NVD |
|---|---|---|
| CVSS v3 Base Score | 7.5 | |
| Attack Vector | Network | |
| Attack Complexity | Low | |
| Privileges Required | None | |
| User Interaction | None | |
| Scope | Unchanged | |
| Confidentiality Impact | None | |
| Integrity Impact | None | |
| Availability Impact | High |
CVSS v3 Vector
Red Hat CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Acknowledgements
Red Hat would like to thank fouzhe and zkbytes for reporting this issue.
Frequently Asked Questions
Why is Red Hat's CVSS v3 score or Impact different from other vendors?
For more information, see https://access.redhat.com/solutions/762393.
My product is listed as "Under investigation" or "Affected", when will Red Hat release a fix for this vulnerability?
- "Under investigation" doesn't necessarily mean that the product is affected by this vulnerability. It only means that our Analysis Team is still working on determining whether the product is affected and how it is affected.
- "Affected" means that our Analysis Team has determined that this product is affected by this vulnerability and might release a fix to address this in the near future.
What can I do if my product is listed as "Will not fix"?
Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options:
- Upgrade to a supported product version that includes a fix for this vulnerability (recommended).
- Apply a mitigation (if one exists).
- Open a This content is not included.support case to request a prioritization of releasing a fix for this vulnerability.
What can I do if my product is listed as "Fix deferred"?
Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options:
- Apply a mitigation (if one exists).
- Open a This content is not included.support case to request a prioritization of releasing a fix for this vulnerability.
- Red Hat Engineering focuses on addressing high-priority issues based on their complexity or limited lifecycle support. Therefore, lower-priority issues will not receive immediate fixes.
What is a mitigation?
I have a Red Hat product but it is not in the above list, is it affected?
Why is my security scanner reporting my product as vulnerable to this vulnerability even though my product version is fixed or not affected?
My product is listed as "Out of Support Scope". What does this mean?
Not sure what something means? Check out our Security Glossary.