Amazon Linux 2 Security Advisory: ALAS2-2025-2849
Advisory Released Date: 2025-05-13
Advisory Updated Date: 2025-05-13
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. (CVE-2025-32906)
A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. (CVE-2025-32907)
libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value (CVE-2025-32911)
A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function. (CVE-2025-32913)
A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. (CVE-2025-32914)
Affected Packages:
libsoup
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libsoup to update your system.
aarch64:
libsoup-2.56.0-6.amzn2.0.3.aarch64
libsoup-devel-2.56.0-6.amzn2.0.3.aarch64
libsoup-debuginfo-2.56.0-6.amzn2.0.3.aarch64
i686:
libsoup-2.56.0-6.amzn2.0.3.i686
libsoup-devel-2.56.0-6.amzn2.0.3.i686
libsoup-debuginfo-2.56.0-6.amzn2.0.3.i686
src:
libsoup-2.56.0-6.amzn2.0.3.src
x86_64:
libsoup-2.56.0-6.amzn2.0.3.x86_64
libsoup-devel-2.56.0-6.amzn2.0.3.x86_64
libsoup-debuginfo-2.56.0-6.amzn2.0.3.x86_64