{"id":"CVE-2025-32913","details":"A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.","modified":"2026-03-11T07:53:01.495075894Z","published":"2025-04-14T14:15:24Z","withdrawn":"2026-01-27T04:20:00.320786Z","related":["ALSA-2025:4560","ALSA-2025:7436","ALSA-2025:8292","MGASA-2025-0261","SUSE-SU-2025:01504-1","SUSE-SU-2025:01794-1","SUSE-SU-2025:01801-1","SUSE-SU-2025:01802-1","SUSE-SU-2025:01864-1","SUSE-SU-2025:1504-1","SUSE-SU-2025:1510-1","SUSE-SU-2025:20375-1","SUSE-SU-2025:20446-1","openSUSE-SU-2025:15189-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4439"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4440"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4508"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4538"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4560"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4568"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4609"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4624"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7436"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:8292"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:9179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359357"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-32913"}],"schema_version":"1.7.3"}