{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.2-5.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.2-5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n- CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285).\n- CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292).\n- CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287).\n","id":"SUSE-SU-2025:20105-1","modified":"2025-02-03T09:17:47Z","published":"2025-02-03T09:17:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520105-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52530"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52532"}],"related":["CVE-2024-52530","CVE-2024-52531","CVE-2024-52532"],"summary":"Security update for libsoup","upstream":["CVE-2024-52530","CVE-2024-52531","CVE-2024-52532"]}