{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.4-150600.3.7.1","libsoup-devel":"3.4.4-150600.3.7.1","libsoup-lang":"3.4.4-150600.3.7.1","typelib-1_0-Soup-3_0":"3.4.4-150600.3.7.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.4-150600.3.7.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.4-150600.3.7.1","libsoup-3_0-0-32bit":"3.4.4-150600.3.7.1","libsoup-devel":"3.4.4-150600.3.7.1","libsoup-devel-32bit":"3.4.4-150600.3.7.1","libsoup-lang":"3.4.4-150600.3.7.1","typelib-1_0-Soup-3_0":"3.4.4-150600.3.7.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"libsoup","purl":"pkg:rpm/opensuse/libsoup&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.4-150600.3.7.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n - CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing conten (bsc#1240750) \n - CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752) \n - CVE-2025-32051: Fixed segmentation fault when parsing malformed data URI (bsc#1240754)\n - CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756) \n - CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757) \n - CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263)\n - CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222) \n - CVE-2025-32908: Fixed HTTP request may lead to server crash due to HTTP/2 server not fully validating the values of pseudo-headers (bsc#1241223)\n - CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226)\n - CVE-2025-32910: Fixed NULL pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252)\n - CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via 'params' (bsc#1241238)\n - CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214)\n - CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162)\n - CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164) \n - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686) \n - CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688) \n","id":"SUSE-SU-2025:1504-1","modified":"2025-05-07T12:06:15Z","published":"2025-05-07T12:06:15Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20251504-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-2784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-46420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-46421"}],"related":["CVE-2025-2784","CVE-2025-32050","CVE-2025-32051","CVE-2025-32052","CVE-2025-32053","CVE-2025-32906","CVE-2025-32907","CVE-2025-32908","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32912","CVE-2025-32913","CVE-2025-32914","CVE-2025-46420","CVE-2025-46421"],"summary":"Security update for libsoup","upstream":["CVE-2025-2784","CVE-2025-32050","CVE-2025-32051","CVE-2025-32052","CVE-2025-32053","CVE-2025-32906","CVE-2025-32907","CVE-2025-32908","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32912","CVE-2025-32913","CVE-2025-32914","CVE-2025-46420","CVE-2025-46421"]}