CVE-2025-32052: Buffer Over-read
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
AI Analysis
Technical Summary
The vulnerability CVE-2025-32052 is a heap buffer overflow in the sniff_unknown() function of libsoup, an HTTP client and server library used in GNOME. This flaw can cause a heap buffer over-read, which may lead to denial of service or limited information disclosure. The vulnerability has a CVSS 3.1 base score of 6.5 (medium severity) with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts confidentiality and availability. Red Hat has released security updates for multiple Red Hat Enterprise Linux 9.x variants that include fixes for this and several other libsoup vulnerabilities. The vendor advisories provide detailed package updates and instructions for remediation.
Potential Impact
The vulnerability may allow an attacker to cause a heap buffer over-read in applications using the vulnerable libsoup library, potentially leading to application crashes (denial of service) or limited information disclosure. The CVSS score of 6.5 reflects a medium severity impact with confidentiality and availability affected. There are no known exploits in the wild at this time. The issue affects multiple Red Hat Enterprise Linux 9.x Extended Update Support and Update Services for SAP Solutions versions.
Mitigation Recommendations
Red Hat has released official security updates that fix this vulnerability in libsoup for Red Hat Enterprise Linux 9.2 and 9.4 Extended Update Support releases. Users and administrators should apply the relevant security updates as detailed in the Red Hat advisories RHSA-2025:4440 and RHSA-2025:4508. The advisories include package names and versions for patched libsoup packages. Applying these updates will remediate the heap buffer overflow in sniff_unknown() and other related vulnerabilities. Patch status is confirmed and official fixes are available.
CVE-2025-32052: Buffer Over-read
Description
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2025-32052 is a heap buffer overflow in the sniff_unknown() function of libsoup, an HTTP client and server library used in GNOME. This flaw can cause a heap buffer over-read, which may lead to denial of service or limited information disclosure. The vulnerability has a CVSS 3.1 base score of 6.5 (medium severity) with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts confidentiality and availability. Red Hat has released security updates for multiple Red Hat Enterprise Linux 9.x variants that include fixes for this and several other libsoup vulnerabilities. The vendor advisories provide detailed package updates and instructions for remediation.
Potential Impact
The vulnerability may allow an attacker to cause a heap buffer over-read in applications using the vulnerable libsoup library, potentially leading to application crashes (denial of service) or limited information disclosure. The CVSS score of 6.5 reflects a medium severity impact with confidentiality and availability affected. There are no known exploits in the wild at this time. The issue affects multiple Red Hat Enterprise Linux 9.x Extended Update Support and Update Services for SAP Solutions versions.
Mitigation Recommendations
Red Hat has released official security updates that fix this vulnerability in libsoup for Red Hat Enterprise Linux 9.2 and 9.4 Extended Update Support releases. Users and administrators should apply the relevant security updates as detailed in the Red Hat advisories RHSA-2025:4440 and RHSA-2025:4508. The advisories include package names and versions for patched libsoup packages. Applying these updates will remediate the heap buffer overflow in sniff_unknown() and other related vulnerabilities. Patch status is confirmed and official fixes are available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-04-03T01:42:14.135Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
- Vendor Advisory Urls
- [{"url":"https://access.redhat.com/errata/RHSA-2025:4440","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4508","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4560","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4568","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:7436","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8292","vendor":"Red Hat"},{"url":"https://access.redhat.com/security/cve/CVE-2025-32052","vendor":"Red Hat"}]
Threat ID: 682cd0fc1484d88663aecb95
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 4/22/2026, 10:47:16 PM
Last updated: 5/9/2026, 5:31:39 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.