Skip to content

CVE-2025-4476, CVE-2025-4945, CVE-2025-4948, CVE-2025-4969, CVE-2025-12105, CVE-2025-46421, CVE-2026-1761#5

Merged
Zeno-sole merged 1 commit intodeepin-community:masterfrom
UTsweetyfish:cve-2026-jan
Mar 23, 2026
Merged

CVE-2025-4476, CVE-2025-4945, CVE-2025-4948, CVE-2025-4969, CVE-2025-12105, CVE-2025-46421, CVE-2026-1761#5
Zeno-sole merged 1 commit intodeepin-community:masterfrom
UTsweetyfish:cve-2026-jan

Conversation

@UTsweetyfish
Copy link
Copy Markdown
Contributor

No description provided.

@deepin-ci-robot deepin-ci-robot requested a review from myml February 2, 2026 10:03
@deepin-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please ask for approval from utsweetyfish. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@deepin-ci-robot
Copy link
Copy Markdown
Contributor

/hold
因为该quilt包的上游版本号变更,详情见: deepin-community/infra-settings#134

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Feb 2, 2026

TAG Bot

TAG: 2.74.3-10.1deepin2
EXISTED: no
DISTRIBUTION: unstable

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

wip:

  • CVE-2025-4035
    A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.
  • CVE-2025-9901
    A flaw was found in libsoup’s caching mechanism, SoupCache, where the HTTP Vary header is ignored when evaluating cached responses. This header ensures that responses vary appropriately based on request headers such as language or authentication. Without this check, cached content can be incorrectly reused across different requests, potentially exposing sensitive user information. While the issue is unlikely to affect everyday desktop use, it could result in confidentiality breaches in proxy or multi-user environments.
  • CVE-2025-14523
    A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
  • CVE-2025-32049
    A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
  • CVE-2025-32907
    SoupServerMessage / soup_server_message_* / ...
    A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service.
  • CVE-2026-0716
    A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted.
  • CVE-2026-0719
    A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
  • CVE-2026-1467
    A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
  • CVE-2026-1536
    A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.
  • CVE-2026-1539
    A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.

@Zeno-sole Zeno-sole marked this pull request as ready for review March 19, 2026 11:33
@Zeno-sole
Copy link
Copy Markdown

/integrate

@github-actions
Copy link
Copy Markdown

AutoIntegrationPr Bot
auto integrate with pr url: deepin-community/Repository-Integration#3753
PrNumber: 3753
PrBranch: auto-integration-23292887700

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish UTsweetyfish changed the title CVE-2025-4476, CVE-2025-4945, CVE-2025-4948, CVE-2025-4969, CVE-2025-12105, CVE-2025-46421 CVE-2025-4476, CVE-2025-4945, CVE-2025-4948, CVE-2025-4969, CVE-2025-12105, CVE-2025-46421, CVE-2026-1761 Mar 19, 2026
@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

1 similar comment
@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish UTsweetyfish force-pushed the cve-2026-jan branch 2 times, most recently from 1961782 to ebad5cb Compare March 20, 2026 06:23
@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

/integrate

@UTsweetyfish
Copy link
Copy Markdown
Contributor Author

@Zeno-sole 应该可以了

@Zeno-sole
Copy link
Copy Markdown

/integrate

@Zeno-sole Zeno-sole merged commit 621b30e into deepin-community:master Mar 23, 2026
6 of 7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants