Source: libsoup2.4
Version: 2.74.3-10
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/issues/439
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for libsoup2.4.

CVE-2025-46421[0]:
| A flaw was found in libsoup. When libsoup clients encounter an HTTP
| redirect, they mistakenly send the HTTP Authorization header to the
| new host that the redirection points to. This allows the new host to
| impersonate the user to the original host that issued the redirect.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-46421
    https://www.cve.org/CVERecord?id=CVE-2025-46421
[1] https://gitlab.gnome.org/GNOME/libsoup/-/issues/439

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to