Name | CVE-2025-46421 |
Description | A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1104054 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libsoup2.4 (PTS) | bullseye | 2.72.0-2 | vulnerable |
bullseye (security) | 2.72.0-2+deb11u1 | vulnerable | |
bookworm | 2.74.3-1+deb12u1 | vulnerable | |
sid, trixie | 2.74.3-10 | vulnerable | |
libsoup3 (PTS) | bookworm | 3.2.2-2 | vulnerable |
sid, trixie | 3.6.5-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libsoup2.4 | source | (unstable) | (unfixed) | 1104054 | ||
libsoup3 | source | (unstable) | 3.6.5-1 |
https://gitlab.gnome.org/GNOME/libsoup/-/issues/439
https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/436
Fixed by: https://gitlab.gnome.org/GNOME/libsoup/-/commit/3e5c26415811f19e7737238bb23305ffaf96f66b (3.6.5)