Security update for libsoup2
Announcement ID: | SUSE-SU-2025:01802-1 |
---|---|
Release Date: | 2025-06-03T01:15:23Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for libsoup2 fixes the following issues:
- CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332)
- CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423)
- CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263)
- CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226)
- CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252)
- CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via "params". (bsc#1241238)
- CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214)
- CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1802=1 SUSE-2025-1802=1
-
Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1802=1
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1802=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1
- libsoup-2_4-1-2.74.3-150600.4.9.1
- libsoup2-debugsource-2.74.3-150600.4.9.1
- libsoup2-devel-2.74.3-150600.4.9.1
- typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1
-
openSUSE Leap 15.6 (x86_64)
- libsoup2-devel-32bit-2.74.3-150600.4.9.1
- libsoup-2_4-1-32bit-2.74.3-150600.4.9.1
- libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.9.1
-
openSUSE Leap 15.6 (noarch)
- libsoup2-lang-2.74.3-150600.4.9.1
-
openSUSE Leap 15.6 (aarch64_ilp32)
- libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.9.1
- libsoup2-devel-64bit-2.74.3-150600.4.9.1
- libsoup-2_4-1-64bit-2.74.3-150600.4.9.1
-
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1
- libsoup-2_4-1-2.74.3-150600.4.9.1
- libsoup2-debugsource-2.74.3-150600.4.9.1
- libsoup2-devel-2.74.3-150600.4.9.1
- typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1
-
Basesystem Module 15-SP6 (noarch)
- libsoup2-lang-2.74.3-150600.4.9.1
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1
- libsoup-2_4-1-2.74.3-150600.4.9.1
- libsoup2-debugsource-2.74.3-150600.4.9.1
- libsoup2-devel-2.74.3-150600.4.9.1
- typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1
-
Basesystem Module 15-SP7 (noarch)
- libsoup2-lang-2.74.3-150600.4.9.1
References:
- https://www.suse.com/security/cve/CVE-2025-32906.html
- https://www.suse.com/security/cve/CVE-2025-32909.html
- https://www.suse.com/security/cve/CVE-2025-32910.html
- https://www.suse.com/security/cve/CVE-2025-32911.html
- https://www.suse.com/security/cve/CVE-2025-32912.html
- https://www.suse.com/security/cve/CVE-2025-32913.html
- https://www.suse.com/security/cve/CVE-2025-4948.html
- https://www.suse.com/security/cve/CVE-2025-4969.html
- https://bugzilla.suse.com/show_bug.cgi?id=1241162
- https://bugzilla.suse.com/show_bug.cgi?id=1241214
- https://bugzilla.suse.com/show_bug.cgi?id=1241226
- https://bugzilla.suse.com/show_bug.cgi?id=1241238
- https://bugzilla.suse.com/show_bug.cgi?id=1241252
- https://bugzilla.suse.com/show_bug.cgi?id=1241263
- https://bugzilla.suse.com/show_bug.cgi?id=1243332
- https://bugzilla.suse.com/show_bug.cgi?id=1243423