Security update for libsoup
Announcement ID: | SUSE-SU-2025:1518-1 |
---|---|
Release Date: | 2025-05-08T19:36:02Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 11 vulnerabilities can now be installed.
Description:
This update for libsoup fixes the following issues:
- CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
- CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
- CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)
- CVE-2025-2784: Fixed heap buffer over-read in
skip_insignificant_space
when sniffing content (bsc#1240750) - CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752)
- CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756)
- CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)
- CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222)
- CVE-2025-32914: Fixed out of bounds read in
soup_multipart_new_from_message()
(bsc#1241164) - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)
- CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1518=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1518=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- libsoup-devel-2.62.2-5.12.1
- libsoup-2_4-1-debuginfo-2.62.2-5.12.1
- typelib-1_0-Soup-2_4-2.62.2-5.12.1
- libsoup-2_4-1-2.62.2-5.12.1
- libsoup-debugsource-2.62.2-5.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- libsoup-lang-2.62.2-5.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
- libsoup-2_4-1-32bit-2.62.2-5.12.1
- libsoup-2_4-1-debuginfo-32bit-2.62.2-5.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- libsoup-2_4-1-32bit-2.62.2-5.12.1
- libsoup-devel-2.62.2-5.12.1
- libsoup-2_4-1-debuginfo-2.62.2-5.12.1
- typelib-1_0-Soup-2_4-2.62.2-5.12.1
- libsoup-2_4-1-2.62.2-5.12.1
- libsoup-debugsource-2.62.2-5.12.1
- libsoup-2_4-1-debuginfo-32bit-2.62.2-5.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- libsoup-lang-2.62.2-5.12.1
References:
- https://www.suse.com/security/cve/CVE-2024-52530.html
- https://www.suse.com/security/cve/CVE-2024-52531.html
- https://www.suse.com/security/cve/CVE-2024-52532.html
- https://www.suse.com/security/cve/CVE-2025-2784.html
- https://www.suse.com/security/cve/CVE-2025-32050.html
- https://www.suse.com/security/cve/CVE-2025-32052.html
- https://www.suse.com/security/cve/CVE-2025-32053.html
- https://www.suse.com/security/cve/CVE-2025-32907.html
- https://www.suse.com/security/cve/CVE-2025-32914.html
- https://www.suse.com/security/cve/CVE-2025-46420.html
- https://www.suse.com/security/cve/CVE-2025-46421.html
- https://bugzilla.suse.com/show_bug.cgi?id=1233285
- https://bugzilla.suse.com/show_bug.cgi?id=1233287
- https://bugzilla.suse.com/show_bug.cgi?id=1233292
- https://bugzilla.suse.com/show_bug.cgi?id=1240750
- https://bugzilla.suse.com/show_bug.cgi?id=1240752
- https://bugzilla.suse.com/show_bug.cgi?id=1240756
- https://bugzilla.suse.com/show_bug.cgi?id=1240757
- https://bugzilla.suse.com/show_bug.cgi?id=1241164
- https://bugzilla.suse.com/show_bug.cgi?id=1241222
- https://bugzilla.suse.com/show_bug.cgi?id=1241686
- https://bugzilla.suse.com/show_bug.cgi?id=1241688