<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libsoup-2_4-1-2.74.3-11.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15189-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-06-01T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-06-01T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-06-01T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libsoup-2_4-1-2.74.3-11.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libsoup-2_4-1-2.74.3-11.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15189</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:15189-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32906/</URL>
      <Description>SUSE CVE CVE-2025-32906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32909/</URL>
      <Description>SUSE CVE CVE-2025-32909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32910/</URL>
      <Description>SUSE CVE CVE-2025-32910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32912/</URL>
      <Description>SUSE CVE CVE-2025-32912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32913/</URL>
      <Description>SUSE CVE CVE-2025-32913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4948/</URL>
      <Description>SUSE CVE CVE-2025-4948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4969/</URL>
      <Description>SUSE CVE CVE-2025-4969 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-2.74.3-11.1">
      <FullProductName ProductID="libsoup-2_4-1-2.74.3-11.1">libsoup-2_4-1-2.74.3-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-32bit-2.74.3-11.1">
      <FullProductName ProductID="libsoup-2_4-1-32bit-2.74.3-11.1">libsoup-2_4-1-32bit-2.74.3-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-2.74.3-11.1">
      <FullProductName ProductID="libsoup2-devel-2.74.3-11.1">libsoup2-devel-2.74.3-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-32bit-2.74.3-11.1">
      <FullProductName ProductID="libsoup2-devel-32bit-2.74.3-11.1">libsoup2-devel-32bit-2.74.3-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-lang-2.74.3-11.1">
      <FullProductName ProductID="libsoup2-lang-2.74.3-11.1">libsoup2-lang-2.74.3-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Soup-2_4-2.74.3-11.1">
      <FullProductName ProductID="typelib-1_0-Soup-2_4-2.74.3-11.1">typelib-1_0-Soup-2_4-2.74.3-11.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsoup-2_4-1-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1">libsoup-2_4-1-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-32bit-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1">libsoup-2_4-1-32bit-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1">libsoup2-devel-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-32bit-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1">libsoup2-devel-32bit-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-lang-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1">libsoup2-lang-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.74.3-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1">typelib-1_0-Soup-2_4-2.74.3-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.</Note>
    </Notes>
    <CVE>CVE-2025-32906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32906.html</URL>
        <Description>CVE-2025-32906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241263</URL>
        <Description>SUSE Bug 1241263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32909.html</URL>
        <Description>CVE-2025-32909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241226</URL>
        <Description>SUSE Bug 1241226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32910.html</URL>
        <Description>CVE-2025-32910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241252</URL>
        <Description>SUSE Bug 1241252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32912.html</URL>
        <Description>CVE-2025-32912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241214</URL>
        <Description>SUSE Bug 1241214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.</Note>
    </Notes>
    <CVE>CVE-2025-32913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32913.html</URL>
        <Description>CVE-2025-32913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241162</URL>
        <Description>SUSE Bug 1241162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.</Note>
    </Notes>
    <CVE>CVE-2025-4948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4948.html</URL>
        <Description>CVE-2025-4948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243332</URL>
        <Description>SUSE Bug 1243332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read).</Note>
    </Notes>
    <CVE>CVE-2025-4969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup-2_4-1-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-devel-32bit-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoup2-lang-2.74.3-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Soup-2_4-2.74.3-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4969.html</URL>
        <Description>CVE-2025-4969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243423</URL>
        <Description>SUSE Bug 1243423</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
