<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libsoup</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1518-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-08T19:35:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-08T19:35:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-08T19:35:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libsoup</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libsoup fixes the following issues:

 - CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
 - CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
 - CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)
 - CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing content (bsc#1240750)
 - CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752)
 - CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756)
 - CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)
 - CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222)
 - CVE-2025-32914: Fixed out of bounds read  in `soup_multipart_new_from_message()` (bsc#1241164)
 - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)
 - CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1518,SUSE-SLE-SERVER-12-SP5-LTSS-2025-1518,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1518</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      <Description>Link for SUSE-SU-2025:1518-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:1518-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233285</URL>
      <Description>SUSE Bug 1233285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233287</URL>
      <Description>SUSE Bug 1233287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233292</URL>
      <Description>SUSE Bug 1233292</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240750</URL>
      <Description>SUSE Bug 1240750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240752</URL>
      <Description>SUSE Bug 1240752</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240756</URL>
      <Description>SUSE Bug 1240756</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240757</URL>
      <Description>SUSE Bug 1240757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241164</URL>
      <Description>SUSE Bug 1241164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241222</URL>
      <Description>SUSE Bug 1241222</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241686</URL>
      <Description>SUSE Bug 1241686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241688</URL>
      <Description>SUSE Bug 1241688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-52530/</URL>
      <Description>SUSE CVE CVE-2024-52530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-52531/</URL>
      <Description>SUSE CVE CVE-2024-52531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-52532/</URL>
      <Description>SUSE CVE CVE-2024-52532 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2784/</URL>
      <Description>SUSE CVE CVE-2025-2784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32050/</URL>
      <Description>SUSE CVE CVE-2025-32050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32052/</URL>
      <Description>SUSE CVE CVE-2025-32052 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32053/</URL>
      <Description>SUSE CVE CVE-2025-32053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32907/</URL>
      <Description>SUSE CVE CVE-2025-32907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32914/</URL>
      <Description>SUSE CVE CVE-2025-32914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46420/</URL>
      <Description>SUSE CVE CVE-2025-46420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46421/</URL>
      <Description>SUSE CVE CVE-2025-46421 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-2_4-1-2.62.2-5.12.1">libsoup-2_4-1-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-32bit-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-2_4-1-32bit-2.62.2-5.12.1">libsoup-2_4-1-32bit-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-64bit-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-2_4-1-64bit-2.62.2-5.12.1">libsoup-2_4-1-64bit-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-devel-2.62.2-5.12.1">libsoup-devel-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-32bit-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-devel-32bit-2.62.2-5.12.1">libsoup-devel-32bit-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-64bit-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-devel-64bit-2.62.2-5.12.1">libsoup-devel-64bit-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-lang-2.62.2-5.12.1">
      <FullProductName ProductID="libsoup-lang-2.62.2-5.12.1">libsoup-lang-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Soup-2_4-2.62.2-5.12.1">
      <FullProductName ProductID="typelib-1_0-Soup-2_4-2.62.2-5.12.1">typelib-1_0-Soup-2_4-2.62.2-5.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsoup-2_4-1-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1">libsoup-2_4-1-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-32bit-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1">libsoup-2_4-1-32bit-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1">libsoup-devel-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1">libsoup-lang-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1">typelib-1_0-Soup-2_4-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1">libsoup-2_4-1-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-32bit-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1">libsoup-2_4-1-32bit-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1">libsoup-devel-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1">libsoup-lang-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.62.2-5.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1">typelib-1_0-Soup-2_4-2.62.2-5.12.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.</Note>
    </Notes>
    <CVE>CVE-2024-52530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-52530.html</URL>
        <Description>CVE-2024-52530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233285</URL>
        <Description>SUSE Bug 1233285</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).</Note>
    </Notes>
    <CVE>CVE-2024-52531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-52531.html</URL>
        <Description>CVE-2024-52531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233285</URL>
        <Description>SUSE Bug 1233285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233292</URL>
        <Description>SUSE Bug 1233292</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.</Note>
    </Notes>
    <CVE>CVE-2024-52532</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-52532.html</URL>
        <Description>CVE-2024-52532</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233285</URL>
        <Description>SUSE Bug 1233285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233287</URL>
        <Description>SUSE Bug 1233287</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.</Note>
    </Notes>
    <CVE>CVE-2025-2784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2784.html</URL>
        <Description>CVE-2025-2784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240750</URL>
        <Description>SUSE Bug 1240750</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.</Note>
    </Notes>
    <CVE>CVE-2025-32050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32050.html</URL>
        <Description>CVE-2025-32050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240752</URL>
        <Description>SUSE Bug 1240752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2025-32052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32052.html</URL>
        <Description>CVE-2025-32052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240756</URL>
        <Description>SUSE Bug 1240756</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2025-32053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32053.html</URL>
        <Description>CVE-2025-32053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240757</URL>
        <Description>SUSE Bug 1240757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-32907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32907.html</URL>
        <Description>CVE-2025-32907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241222</URL>
        <Description>SUSE Bug 1241222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.</Note>
    </Notes>
    <CVE>CVE-2025-32914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32914.html</URL>
        <Description>CVE-2025-32914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241164</URL>
        <Description>SUSE Bug 1241164</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.</Note>
    </Notes>
    <CVE>CVE-2025-46420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46420.html</URL>
        <Description>CVE-2025-46420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241686</URL>
        <Description>SUSE Bug 1241686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.</Note>
    </Notes>
    <CVE>CVE-2025-46421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-2_4-1-32bit-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-devel-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsoup-lang-2.62.2-5.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-Soup-2_4-2.62.2-5.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251518-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46421.html</URL>
        <Description>CVE-2025-46421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241688</URL>
        <Description>SUSE Bug 1241688</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
