Source: libsoup2.4 Version: 2.74.3-10 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/issues/439 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libsoup2.4. CVE-2025-46421[0]: | A flaw was found in libsoup. When libsoup clients encounter an HTTP | redirect, they mistakenly send the HTTP Authorization header to the | new host that the redirection points to. This allows the new host to | impersonate the user to the original host that issued the redirect. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-46421 https://www.cve.org/CVERecord?id=CVE-2025-46421 [1] https://gitlab.gnome.org/GNOME/libsoup/-/issues/439 Please adjust the affected versions in the BTS as needed. Regards, Salvatore