<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libsoup</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1519-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-09T00:07:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-09T00:07:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-09T00:07:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libsoup</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libsoup fixes the following issues:

 - CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing content (bsc#1240750)
 - CVE-2025-32050: Fixed Integer overflow in append_param_quoted (bsc#1240752)
 - CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756)
 - CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)
 - CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222)
 - CVE-2025-32914: Fixed out of bounds read  in `soup_multipart_new_from_message()` (bsc#1241164)
 - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)
 - CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1519,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1519,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1519,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1519,SUSE-SUSE-MicroOS-5.2-2025-1519,SUSE-Storage-7.1-2025-1519</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      <Description>Link for SUSE-SU-2025:1519-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:1519-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240750</URL>
      <Description>SUSE Bug 1240750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240752</URL>
      <Description>SUSE Bug 1240752</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240756</URL>
      <Description>SUSE Bug 1240756</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240757</URL>
      <Description>SUSE Bug 1240757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241164</URL>
      <Description>SUSE Bug 1241164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241222</URL>
      <Description>SUSE Bug 1241222</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241686</URL>
      <Description>SUSE Bug 1241686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241688</URL>
      <Description>SUSE Bug 1241688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2784/</URL>
      <Description>SUSE CVE CVE-2025-2784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32050/</URL>
      <Description>SUSE CVE CVE-2025-32050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32052/</URL>
      <Description>SUSE CVE CVE-2025-32052 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32053/</URL>
      <Description>SUSE CVE CVE-2025-32053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32907/</URL>
      <Description>SUSE CVE CVE-2025-32907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-32914/</URL>
      <Description>SUSE CVE CVE-2025-32914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46420/</URL>
      <Description>SUSE CVE CVE-2025-46420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46421/</URL>
      <Description>SUSE CVE CVE-2025-46421 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-32bit-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-2_4-1-32bit-2.68.4-150200.4.6.1">libsoup-2_4-1-32bit-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-2_4-1-64bit-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-2_4-1-64bit-2.68.4-150200.4.6.1">libsoup-2_4-1-64bit-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-devel-2.68.4-150200.4.6.1">libsoup-devel-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-32bit-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-devel-32bit-2.68.4-150200.4.6.1">libsoup-devel-32bit-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-devel-64bit-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-devel-64bit-2.68.4-150200.4.6.1">libsoup-devel-64bit-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoup-lang-2.68.4-150200.4.6.1">
      <FullProductName ProductID="libsoup-lang-2.68.4-150200.4.6.1">libsoup-lang-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">
      <FullProductName ProductID="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsoup-2_4-1-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1">libsoup-devel-2.68.4-150200.4.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1">libsoup-lang-2.68.4-150200.4.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1">libsoup-devel-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1">libsoup-lang-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1">libsoup-devel-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1">libsoup-lang-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-2_4-1-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1">libsoup-2_4-1-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-devel-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1">libsoup-devel-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoup-lang-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1">libsoup-lang-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1">typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.</Note>
    </Notes>
    <CVE>CVE-2025-2784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2784.html</URL>
        <Description>CVE-2025-2784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240750</URL>
        <Description>SUSE Bug 1240750</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.</Note>
    </Notes>
    <CVE>CVE-2025-32050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32050.html</URL>
        <Description>CVE-2025-32050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240752</URL>
        <Description>SUSE Bug 1240752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2025-32052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32052.html</URL>
        <Description>CVE-2025-32052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240756</URL>
        <Description>SUSE Bug 1240756</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2025-32053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32053.html</URL>
        <Description>CVE-2025-32053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240757</URL>
        <Description>SUSE Bug 1240757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-32907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32907.html</URL>
        <Description>CVE-2025-32907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241222</URL>
        <Description>SUSE Bug 1241222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.</Note>
    </Notes>
    <CVE>CVE-2025-32914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-32914.html</URL>
        <Description>CVE-2025-32914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241164</URL>
        <Description>SUSE Bug 1241164</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.</Note>
    </Notes>
    <CVE>CVE-2025-46420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46420.html</URL>
        <Description>CVE-2025-46420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241686</URL>
        <Description>SUSE Bug 1241686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.</Note>
    </Notes>
    <CVE>CVE-2025-46421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-2_4-1-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-devel-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:libsoup-lang-2.68.4-150200.4.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251519-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46421.html</URL>
        <Description>CVE-2025-46421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241688</URL>
        <Description>SUSE Bug 1241688</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
