SUSE-SU-2026:20529-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620529-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20529-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:20529-1
Upstream
  • CVE-2025-12105
  • CVE-2026-2369
  • CVE-2026-2443
  • CVE-2026-2708
Related
  • CVE-2025-12105
  • CVE-2025-32049
  • CVE-2026-2369
  • CVE-2026-2443
  • CVE-2026-2708
Published
2026-03-02T13:19:17Z
Modified
2026-03-11T07:31:52.513320Z
Summary
Security update for libsoup
Details

This update for libsoup fixes the following issues:

  • CVE-2025-12105: Fixed heap use-after-free in message queue handling during HTTP/2 read completion. (bsc#1252555)
  • CVE-2025-32049: Fixed a Denial of Service attack to websocket server. (bsc#1240751)
  • CVE-2026-2443: Fixed an out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information disclosure to remote attackers. (bsc#1258170)
  • CVE-2026-2369: Fixed a buffer overread due to integer underflow when handling zero-length resources. (bsc#1258120)
  • CVE-2026-2708: Fixed HTTP request smuggling via duplicate Content-Length headers. (bsc#1258508)
References

Affected packages

SUSE:Linux Micro 6.0 / libsoup

Package

Name
libsoup
Purl
pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Micro%206.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.2-13.1

Ecosystem specific

{
    "binaries": [
        {
            "libsoup-3_0-0": "3.4.2-13.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20529-1.json"