{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.2-6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.2-6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n- CVE-2025-2784: Fixed Heap buffer over-read in `skip_insignificant_space` when sniffing content (bsc#1240750)\n- CVE-2025-32050: Fixed Integer overflow in append_param_quoted (bsc#1240752)\n- CVE-2025-32051: Fixed Segmentation fault when parsing malformed data URI (bsc#1240754)\n- CVE-2025-32052: Fixed Heap buffer overflow in sniff_unknown() (bsc#1240756)\n- CVE-2025-32053: Fixed Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)\n- CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162)\n- CVE-2025-32914: Fixed out of bounds read  in `soup_multipart_new_from_message()` (bsc#1241164)\n- CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214)\n- CVE-2025-32907: Fixed xcessive memory consumption in server when client requests a large amount of overlapping\n  ranges in a single HTTP request (bsc#1241222)\n- CVE-2025-32906: Fixed Out of bounds reads in soup_headers_parse_request() (bsc#1241263)\n- CVE-2025-32908: Fixed HTTP request may lead to server crash due to HTTP/2 server not fully validating the values\n  of pseudo-headers (bsc#1241223)\n- CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226)\n- CVE-2025-32911: Fixed Double free on soup_message_headers_get_content_disposition() via \"params\" (bsc#1241238)\n- CVE-2025-32910: Fixed null pointer deference on client when server omits the 'realm' parameter in an Unauthorized\n  response with Digest authentication (bsc#1241252)\n- CVE-2025-46420: Fixed Memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)\n- CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)\n","id":"SUSE-SU-2025:20375-1","modified":"2025-05-29T09:19:43Z","published":"2025-05-29T09:19:43Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520375-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-2784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-32914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-46420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-46421"}],"related":["CVE-2025-2784","CVE-2025-32050","CVE-2025-32051","CVE-2025-32052","CVE-2025-32053","CVE-2025-32906","CVE-2025-32907","CVE-2025-32908","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32912","CVE-2025-32913","CVE-2025-32914","CVE-2025-46420","CVE-2025-46421"],"summary":"Security update for libsoup","upstream":["CVE-2025-2784","CVE-2025-32050","CVE-2025-32051","CVE-2025-32052","CVE-2025-32053","CVE-2025-32906","CVE-2025-32907","CVE-2025-32908","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32912","CVE-2025-32913","CVE-2025-32914","CVE-2025-46420","CVE-2025-46421"]}