Security update for libsoup
Announcement ID: | SUSE-SU-2025:1519-1 |
---|---|
Release Date: | 2025-05-09T00:07:48Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for libsoup fixes the following issues:
- CVE-2025-2784: Fixed heap buffer over-read in
skip_insignificant_space
when sniffing content (bsc#1240750) - CVE-2025-32050: Fixed Integer overflow in append_param_quoted (bsc#1240752)
- CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756)
- CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)
- CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222)
- CVE-2025-32914: Fixed out of bounds read in
soup_multipart_new_from_message()
(bsc#1241164) - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)
- CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1519=1
-
SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1519=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1519=1
-
SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-1519=1
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1519=1
-
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1519=1
Package List:
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64)
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-devel-2.68.4-150200.4.6.1
- typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
- libsoup-lang-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-devel-2.68.4-150200.4.6.1
- typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
- libsoup-lang-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-devel-2.68.4-150200.4.6.1
- typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
- libsoup-lang-2.68.4-150200.4.6.1
-
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-devel-2.68.4-150200.4.6.1
- typelib-1_0-Soup-2_4-2.68.4-150200.4.6.1
-
SUSE Enterprise Storage 7.1 (noarch)
- libsoup-lang-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
- libsoup-debugsource-2.68.4-150200.4.6.1
- libsoup-2_4-1-debuginfo-2.68.4-150200.4.6.1
- libsoup-2_4-1-2.68.4-150200.4.6.1
References:
- https://www.suse.com/security/cve/CVE-2025-2784.html
- https://www.suse.com/security/cve/CVE-2025-32050.html
- https://www.suse.com/security/cve/CVE-2025-32052.html
- https://www.suse.com/security/cve/CVE-2025-32053.html
- https://www.suse.com/security/cve/CVE-2025-32907.html
- https://www.suse.com/security/cve/CVE-2025-32914.html
- https://www.suse.com/security/cve/CVE-2025-46420.html
- https://www.suse.com/security/cve/CVE-2025-46421.html
- https://bugzilla.suse.com/show_bug.cgi?id=1240750
- https://bugzilla.suse.com/show_bug.cgi?id=1240752
- https://bugzilla.suse.com/show_bug.cgi?id=1240756
- https://bugzilla.suse.com/show_bug.cgi?id=1240757
- https://bugzilla.suse.com/show_bug.cgi?id=1241164
- https://bugzilla.suse.com/show_bug.cgi?id=1241222
- https://bugzilla.suse.com/show_bug.cgi?id=1241686
- https://bugzilla.suse.com/show_bug.cgi?id=1241688