<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libsoup2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:01802-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-06-03T01:15:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-06-03T01:15:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-06-03T01:15:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libsoup2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libsoup2 fixes the following issues:

- CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) 
- CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) 
- CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) 
- CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) 
- CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) 
- CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via 'params'. (bsc#1241238) 
- CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) 
- CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1802,SUSE-SLE-Module-Basesystem-15-SP6-2025-1802,SUSE-SLE-Module-Basesystem-15-SP7-2025-1802,openSUSE-SLE-15.6-2025-1802</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      <Description>Link for SUSE-SU-2025:01802-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:01802-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241162</URL>
      <Description>SUSE Bug 1241162</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241214</URL>
      <Description>SUSE Bug 1241214</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241226</URL>
      <Description>SUSE Bug 1241226</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241238</URL>
      <Description>SUSE Bug 1241238</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241252</URL>
      <Description>SUSE Bug 1241252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241263</URL>
      <Description>SUSE Bug 1241263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243332</URL>
      <Description>SUSE Bug 1243332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243423</URL>
      <Description>SUSE Bug 1243423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32906/</URL>
      <Description>SUSE CVE CVE-2025-32906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32909/</URL>
      <Description>SUSE CVE CVE-2025-32909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32910/</URL>
      <Description>SUSE CVE CVE-2025-32910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32911/</URL>
      <Description>SUSE CVE CVE-2025-32911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32912/</URL>
      <Description>SUSE CVE CVE-2025-32912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32913/</URL>
      <Description>SUSE CVE CVE-2025-32913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4948/</URL>
      <Description>SUSE CVE CVE-2025-4948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4969/</URL>
      <Description>SUSE CVE CVE-2025-4969 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6" CPE="cpe:/o:suse:sle-module-basesystem:15:sp6">SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7" CPE="cpe:/o:suse:sle-module-basesystem:15:sp7">SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup-2_4-1-2.74.3-150600.4.9.1">libsoup-2_4-1-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-32bit-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup-2_4-1-32bit-2.74.3-150600.4.9.1">libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-64bit-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup-2_4-1-64bit-2.74.3-150600.4.9.1">libsoup-2_4-1-64bit-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup2-devel-2.74.3-150600.4.9.1">libsoup2-devel-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-32bit-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup2-devel-32bit-2.74.3-150600.4.9.1">libsoup2-devel-32bit-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-devel-64bit-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup2-devel-64bit-2.74.3-150600.4.9.1">libsoup2-devel-64bit-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup2-lang-2.74.3-150600.4.9.1">
      <FullProductName ProductID="libsoup2-lang-2.74.3-150600.4.9.1">libsoup2-lang-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1">
      <FullProductName ProductID="typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1">typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsoup-2_4-1-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1">libsoup-2_4-1-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1">libsoup2-devel-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-lang-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1">libsoup2-lang-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1">typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1">libsoup-2_4-1-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1">libsoup2-devel-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-lang-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1">libsoup2-lang-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1">typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1">libsoup-2_4-1-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-32bit-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1">libsoup-2_4-1-32bit-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1">libsoup2-devel-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-devel-32bit-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1">libsoup2-devel-32bit-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup2-lang-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1">libsoup2-lang-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1">typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.</Note>
    </Notes>
    <CVE>CVE-2025-32906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32906.html</URL>
        <Description>CVE-2025-32906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241263</URL>
        <Description>SUSE Bug 1241263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32909.html</URL>
        <Description>CVE-2025-32909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241226</URL>
        <Description>SUSE Bug 1241226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32910.html</URL>
        <Description>CVE-2025-32910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241252</URL>
        <Description>SUSE Bug 1241252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server.</Note>
    </Notes>
    <CVE>CVE-2025-32911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32911.html</URL>
        <Description>CVE-2025-32911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241238</URL>
        <Description>SUSE Bug 1241238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.</Note>
    </Notes>
    <CVE>CVE-2025-32912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32912.html</URL>
        <Description>CVE-2025-32912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241214</URL>
        <Description>SUSE Bug 1241214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.</Note>
    </Notes>
    <CVE>CVE-2025-32913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32913.html</URL>
        <Description>CVE-2025-32913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241162</URL>
        <Description>SUSE Bug 1241162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.</Note>
    </Notes>
    <CVE>CVE-2025-4948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4948.html</URL>
        <Description>CVE-2025-4948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243332</URL>
        <Description>SUSE Bug 1243332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in the libsoup package. This flaw stems from its failure to correctly verify the termination of multipart HTTP messages. This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read).</Note>
    </Notes>
    <CVE>CVE-2025-4969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup-2_4-1-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-devel-32bit-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libsoup2-lang-2.74.3-150600.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501802-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4969.html</URL>
        <Description>CVE-2025-4969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243423</URL>
        <Description>SUSE Bug 1243423</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
