Debian 10704 Published by

The Libsoup2.4 packages for Debian GNU/Linux 9 (Stretch) and 10 (Buster) ELTS have been updated to fix multiple security issues, including heap buffer over-reads and NULL pointer dereferences that could allow attackers to crash or exploit vulnerable systems. The update fixes CVE-2025-2784 through CVE-2025-32914, with additional patches expected for some of the recently allocated CVE IDs. Meanwhile, Chromium for Debian GNU/Linux 12 (Bookworm) and 13 (Trixie) has been updated to fix security issues that could result in arbitrary code execution, denial of service, or information disclosure, with exploits existing in the wild for at least one of these vulnerabilities (CVE-2025-13223).

ELA-1581-1 libsoup2.4 security update
[DSA 6060-1] chromium security update




ELA-1581-1 libsoup2.4 security update


Package : libsoup2.4
Version : 2.56.0-2+deb9u4 (stretch), 2.64.2-2+deb10u2 (buster)

Related CVEs :
CVE-2025-2784
CVE-2025-32050
CVE-2025-32052
CVE-2025-32053
CVE-2025-32906
CVE-2025-32909
CVE-2025-32910
CVE-2025-32911
CVE-2025-32912
CVE-2025-32913
CVE-2025-32914

Multiple issues has been identified in libsoup2.4. This update contains
fixes for a few of them that has previously been adressed in LTS and newer
releases. Additional updates will come when more of the recently allocated
CVE ids have been analyzed.

CVE-2025-2784:
heap buffer over-read when sniffing content via the skip_insight_whitespace()
function. Libsoup clients may read one byte out-of-bounds in response to a
crafted HTTP response by an HTTP server.
CVE-2025-32050:
libsoup append_param_quoted() function may contain an overflow bug resulting
in a buffer under-read.
CVE-2025-32052: vulnerability in the sniff_unknown() function may lead to
heap buffer over-read.
CVE-2025-32053:
vulnerability in sniff_feed_or_html() and skip_insignificant_space()
functions may lead to a heap buffer over-read.
CVE-2025-32906:
soup_headers_parse_request() function may be vulnerable to an out-of-bound
read. This flaw allows a malicious user to use a specially crafted HTTP
request to crash the HTTP server.
CVE-2025-32909:
SoupContentSniffer may be vulnerable to a NULL pointer dereference in the
sniff_mp4 function. The HTTP server may cause the libsoup client to crash.
CVE-2025-32910:
soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference.
This issue may cause the libsoup client to crash.
CVE-2025-32911:
use-after-free memory issue not on the heap in the
soup_message_headers_get_content_disposition() function. This flaw allows a
malicious HTTP client to cause memory corruption in the libsoup server.
CVE-2025-32913:
the soup_message_headers_get_content_disposition() function is vulnerable to
a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a
libsoup client or server that uses this function.
CVE-2025-32914:
the soup_multipart_new_from_message() function is vulnerable to an
out-of-bounds read. This flaw allows a malicious HTTP client to induce the
libsoup server to read out of bounds.
CVE-2025-32912:
SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server
may cause the libsoup client to crash.
Additionally for buster an updated test certificate was included that extends
the expiration to year 2049.


ELA-1581-1 libsoup2.4 security update



[SECURITY] [DSA 6060-1] chromium security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6060-1 security@debian.org
https://www.debian.org/security/ Andres Salomon
November 19, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium
CVE ID : CVE-2025-13223 CVE-2025-13224

Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure. Google is aware that an exploit for CVE-2025-13223 exists
in the wild.

For the oldstable distribution (bookworm), these problems have been fixed
in version 142.0.7444.175-1~deb12u1.

For the stable distribution (trixie), these problems have been fixed in
version 142.0.7444.175-1~deb13u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/