| Name | CVE-2026-3633 |
| Description | A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1130500 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| libsoup2.4 (PTS) | bullseye | 2.72.0-2 | vulnerable |
| bullseye (security) | 2.72.0-2+deb11u3 | vulnerable | |
| bookworm | 2.74.3-1+deb12u1 | vulnerable | |
| trixie | 2.74.3-10.1 | vulnerable | |
| libsoup3 (PTS) | bookworm | 3.2.3-0+deb12u2 | vulnerable |
| trixie | 3.6.5-3 | vulnerable | |
| forky, sid | 3.6.6-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| libsoup2.4 | source | (unstable) | (unfixed) | |||
| libsoup3 | source | (unstable) | (unfixed) | 1130500 |
[trixie] - libsoup3 <no-dsa> (Minor issue)
[bookworm] - libsoup3 <no-dsa> (Minor issue)
[trixie] - libsoup2.4 <no-dsa> (Minor issue)
[bookworm] - libsoup2.4 <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2445128
https://gitlab.gnome.org/GNOME/libsoup/-/issues/484