<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libsoup2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20354-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-13T08:41:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-13T08:41:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-13T08:41:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libsoup2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libsoup2 fixes the following issues:

- CVE-2025-4476: null pointer dereference may lead to denial of service (bsc#1243422).
- CVE-2025-14523: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (bsc#1254876).
- CVE-2025-32049: Denial of Service attack to websocket server (bsc#1240751).
- CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418).
- CVE-2026-0719: stack-based buffer overflow in NTLM authentication can lead to arbitrary code execution (bsc#1256399).
- CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398).
- CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects
  (bsc#1257441).
- CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request
  smuggling and potential DoS (bsc#1257597).
- CVE-2026-2369: Buffer overread due to integer underflow when handling zero-length resources (bsc#1258120).
- CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information
  disclosure to remote attackers (bsc#1258170).
- CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-378</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240751</URL>
      <Description>SUSE Bug 1240751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243422</URL>
      <Description>SUSE Bug 1243422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254876</URL>
      <Description>SUSE Bug 1254876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256399</URL>
      <Description>SUSE Bug 1256399</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256418</URL>
      <Description>SUSE Bug 1256418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257398</URL>
      <Description>SUSE Bug 1257398</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257441</URL>
      <Description>SUSE Bug 1257441</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257597</URL>
      <Description>SUSE Bug 1257597</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258120</URL>
      <Description>SUSE Bug 1258120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258170</URL>
      <Description>SUSE Bug 1258170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258508</URL>
      <Description>SUSE Bug 1258508</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14523/</URL>
      <Description>SUSE CVE CVE-2025-14523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32049/</URL>
      <Description>SUSE CVE CVE-2025-32049 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4476/</URL>
      <Description>SUSE CVE CVE-2025-4476 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-0716/</URL>
      <Description>SUSE CVE CVE-2026-0716 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-0719/</URL>
      <Description>SUSE CVE CVE-2026-0719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1467/</URL>
      <Description>SUSE CVE CVE-2026-1467 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1539/</URL>
      <Description>SUSE CVE CVE-2026-1539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1760/</URL>
      <Description>SUSE CVE CVE-2026-1760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-2369/</URL>
      <Description>SUSE CVE CVE-2026-2369 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-2443/</URL>
      <Description>SUSE CVE CVE-2026-2443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-2708/</URL>
      <Description>SUSE CVE CVE-2026-2708 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-2.74.3-160000.4.1">
      <FullProductName ProductID="libsoup-2_4-1-2.74.3-160000.4.1">libsoup-2_4-1-2.74.3-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-2.74.3-160000.4.1">
      <FullProductName ProductID="libsoup2-devel-2.74.3-160000.4.1">libsoup2-devel-2.74.3-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-lang-2.74.3-160000.4.1">
      <FullProductName ProductID="libsoup2-lang-2.74.3-160000.4.1">libsoup2-lang-2.74.3-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Soup-2_4-2.74.3-160000.4.1">
      <FullProductName ProductID="typelib-1_0-Soup-2_4-2.74.3-160000.4.1">typelib-1_0-Soup-2_4-2.74.3-160000.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsoup-2_4-1-2.74.3-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1">libsoup-2_4-1-2.74.3-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-2.74.3-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1">libsoup2-devel-2.74.3-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-lang-2.74.3-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1">libsoup2-lang-2.74.3-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.74.3-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1">typelib-1_0-Soup-2_4-2.74.3-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in libsoup's HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.</Note>
    </Notes>
    <CVE>CVE-2025-14523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14523.html</URL>
        <Description>CVE-2025-14523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254876</URL>
        <Description>SUSE Bug 1254876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).</Note>
    </Notes>
    <CVE>CVE-2025-32049</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32049.html</URL>
        <Description>CVE-2025-32049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240751</URL>
        <Description>SUSE Bug 1240751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250562</URL>
        <Description>SUSE Bug 1250562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a user's application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a user's client application into connecting to the attacker's malicious server.</Note>
    </Notes>
    <CVE>CVE-2025-4476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4476.html</URL>
        <Description>CVE-2025-4476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243422</URL>
        <Description>SUSE Bug 1243422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup's WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup's WebSocket support with this configuration may be impacted.</Note>
    </Notes>
    <CVE>CVE-2026-0716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-0716.html</URL>
        <Description>CVE-2026-0716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256418</URL>
        <Description>SUSE Bug 1256418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.</Note>
    </Notes>
    <CVE>CVE-2026-0719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-0719.html</URL>
        <Description>CVE-2026-0719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256399</URL>
        <Description>SUSE Bug 1256399</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.</Note>
    </Notes>
    <CVE>CVE-2026-1467</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1467.html</URL>
        <Description>CVE-2026-1467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257398</URL>
        <Description>SUSE Bug 1257398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.</Note>
    </Notes>
    <CVE>CVE-2026-1539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1539.html</URL>
        <Description>CVE-2026-1539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257441</URL>
        <Description>SUSE Bug 1257441</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.</Note>
    </Notes>
    <CVE>CVE-2026-1760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1760.html</URL>
        <Description>CVE-2026-1760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257597</URL>
        <Description>SUSE Bug 1257597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2026-2369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-2369.html</URL>
        <Description>CVE-2026-2369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1258120</URL>
        <Description>SUSE Bug 1258120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.</Note>
    </Notes>
    <CVE>CVE-2026-2443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-2443.html</URL>
        <Description>CVE-2026-2443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1258170</URL>
        <Description>SUSE Bug 1258170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2026-2708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libsoup-2_4-1-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-devel-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libsoup2-lang-2.74.3-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-Soup-2_4-2.74.3-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-2708.html</URL>
        <Description>CVE-2026-2708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1258508</URL>
        <Description>SUSE Bug 1258508</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
