OPENSUSE-SU-2026:20384-1

Vulnerability from csaf_opensuse - Published: 2026-03-18 10:01 - Updated: 2026-03-18 10:01
Summary
Security update for libsoup
Severity
Important
Notes
Title of the patch: Security update for libsoup
Description of the patch: This update for libsoup fixes the following issues: Update to libsoup 3.6.6: - CVE-2025-12105: heap use-after-free in message queue handling during HTTP/2 read completion (bsc#1252555). - CVE-2025-14523: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (bsc#1254876). - CVE-2025-32049: Denial of Service attack to websocket server (bsc#1240751). - CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398). - CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects (bsc#1257441). - CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request smuggling and potential DoS (bsc#1257597). - CVE-2026-2369: Buffer overread due to integer underflow when handling zero-length resources (bsc#1258120). - CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information disclosure to remote attackers (bsc#1258170). - CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508). Changelog: - websocket: Fix out-of-bounds read in process_frame - Check nulls returned by soup_date_time_new_from_http_string() - Numerous fixes to handling of Range headers - server: close the connection after responsing a request containing Content-Length and Transfer-Encoding - Use CRLF as line boundary when parsing chunked enconding data - websocket: do not accept messages frames after closing due to an error - Sanitize filename of content disposition header values - Always validate the headers value when coming from untrusted source - uri-utils: do host validation when checking if a GUri is valid - multipart: check length of bytes read soup_filter_input_stream_read_until() - message-headers: Reject duplicate Host headers - server: null-check soup_date_time_to_string() - auth-digest: fix crash in soup_auth_digest_get_protection_space() - session: fix 'heap-use-after-free' caused by 'finishing' queue item twice - cookies: Avoid expires attribute if date is invalid - http1: Set EOF flag once content-length bytes have been read - date-utils: Add value checks for date/time parsing - multipart: Fix multiple boundry limits - Fixed multiple possible memory leaks - message-headers: Correct merge of ranges - body-input-stream: Correct chunked trailers end detection - server-http2: Correctly validate URIs - multipart: Fix read out of buffer bounds under soup_multipart_new_from_message() - headers: Ensure Request-Line comprises entire first line - tests: Fix MSVC build error - Fix possible deadlock on init from gmodule usage - Updated translations.
Patchnames: openSUSE-Leap-16.0-402
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/o… self
https://bugzilla.suse.com/1240751 self
https://bugzilla.suse.com/1252555 self
https://bugzilla.suse.com/1254876 self
https://bugzilla.suse.com/1257398 self
https://bugzilla.suse.com/1257441 self
https://bugzilla.suse.com/1257597 self
https://bugzilla.suse.com/1258120 self
https://bugzilla.suse.com/1258170 self
https://bugzilla.suse.com/1258508 self
https://www.suse.com/security/cve/CVE-2025-12105/ self
https://www.suse.com/security/cve/CVE-2025-14523/ self
https://www.suse.com/security/cve/CVE-2025-32049/ self
https://www.suse.com/security/cve/CVE-2026-1467/ self
https://www.suse.com/security/cve/CVE-2026-1539/ self
https://www.suse.com/security/cve/CVE-2026-1760/ self
https://www.suse.com/security/cve/CVE-2026-2369/ self
https://www.suse.com/security/cve/CVE-2026-2443/ self
https://www.suse.com/security/cve/CVE-2026-2708/ self
https://www.suse.com/security/cve/CVE-2025-12105 external
https://bugzilla.suse.com/1252555 external
https://www.suse.com/security/cve/CVE-2025-14523 external
https://bugzilla.suse.com/1254876 external
https://www.suse.com/security/cve/CVE-2025-32049 external
https://bugzilla.suse.com/1240751 external
https://bugzilla.suse.com/1250562 external
https://www.suse.com/security/cve/CVE-2026-1467 external
https://bugzilla.suse.com/1257398 external
https://www.suse.com/security/cve/CVE-2026-1539 external
https://bugzilla.suse.com/1257441 external
https://www.suse.com/security/cve/CVE-2026-1760 external
https://bugzilla.suse.com/1257597 external
https://www.suse.com/security/cve/CVE-2026-2369 external
https://bugzilla.suse.com/1258120 external
https://www.suse.com/security/cve/CVE-2026-2443 external
https://bugzilla.suse.com/1258170 external
https://www.suse.com/security/cve/CVE-2026-2708 external
https://bugzilla.suse.com/1258508 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for libsoup",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for libsoup fixes the following issues:\n\nUpdate to libsoup 3.6.6:\n\n- CVE-2025-12105: heap use-after-free in message queue handling during HTTP/2 read completion (bsc#1252555).\n- CVE-2025-14523: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (bsc#1254876).\n- CVE-2025-32049: Denial of Service attack to websocket server (bsc#1240751).\n- CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398).\n- CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects\n  (bsc#1257441).\n- CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request\n  smuggling and potential DoS (bsc#1257597).\n- CVE-2026-2369: Buffer overread due to integer underflow when handling zero-length resources (bsc#1258120).\n- CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information\n  disclosure to remote attackers (bsc#1258170).\n- CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508).\n\nChangelog:\n\n- websocket: Fix out-of-bounds read in process_frame\n- Check nulls returned by soup_date_time_new_from_http_string()\n- Numerous fixes to handling of Range headers\n- server: close the connection after responsing a request\ncontaining Content-Length and Transfer-Encoding\n- Use CRLF as line boundary when parsing chunked enconding data\n- websocket: do not accept messages frames after closing due to\nan error\n- Sanitize filename of content disposition header values\n- Always validate the headers value when coming from untrusted\nsource\n- uri-utils: do host validation when checking if a GUri is valid\n- multipart: check length of bytes read\nsoup_filter_input_stream_read_until()\n- message-headers: Reject duplicate Host headers\n- server: null-check soup_date_time_to_string()\n- auth-digest: fix crash in\nsoup_auth_digest_get_protection_space()\n- session: fix \u0027heap-use-after-free\u0027 caused by \u0027finishing\u0027 queue\nitem twice\n- cookies: Avoid expires attribute if date is invalid\n- http1: Set EOF flag once content-length bytes have been read\n- date-utils: Add value checks for date/time parsing\n- multipart: Fix multiple boundry limits\n- Fixed multiple possible memory leaks\n- message-headers: Correct merge of ranges\n- body-input-stream: Correct chunked trailers end detection\n- server-http2: Correctly validate URIs\n- multipart: Fix read out of buffer bounds under\nsoup_multipart_new_from_message()\n- headers: Ensure Request-Line comprises entire first line\n- tests: Fix MSVC build error\n- Fix possible deadlock on init from gmodule usage\n- Updated translations.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Leap-16.0-402",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20384-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240751",
        "url": "https://bugzilla.suse.com/1240751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252555",
        "url": "https://bugzilla.suse.com/1252555"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254876",
        "url": "https://bugzilla.suse.com/1254876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257398",
        "url": "https://bugzilla.suse.com/1257398"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257441",
        "url": "https://bugzilla.suse.com/1257441"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257597",
        "url": "https://bugzilla.suse.com/1257597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1258120",
        "url": "https://bugzilla.suse.com/1258120"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1258170",
        "url": "https://bugzilla.suse.com/1258170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1258508",
        "url": "https://bugzilla.suse.com/1258508"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-12105 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-12105/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-14523 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-14523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-32049 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-32049/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-1467 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-1467/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-1539 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-1539/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-1760 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-1760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-2369 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-2369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-2443 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-2443/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-2708 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-2708/"
      }
    ],
    "title": "Security update for libsoup",
    "tracking": {
      "current_release_date": "2026-03-18T10:01:12Z",
      "generator": {
        "date": "2026-03-18T10:01:12Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:20384-1",
      "initial_release_date": "2026-03-18T10:01:12Z",
      "revision_history": [
        {
          "date": "2026-03-18T10:01:12Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
                "product": {
                  "name": "libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
                  "product_id": "libsoup-3_0-0-3.6.6-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libsoup-devel-3.6.6-160000.1.1.aarch64",
                "product": {
                  "name": "libsoup-devel-3.6.6-160000.1.1.aarch64",
                  "product_id": "libsoup-devel-3.6.6-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
                  "product_id": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libsoup-lang-3.6.6-160000.1.1.noarch",
                "product": {
                  "name": "libsoup-lang-3.6.6-160000.1.1.noarch",
                  "product_id": "libsoup-lang-3.6.6-160000.1.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
                "product": {
                  "name": "libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
                  "product_id": "libsoup-3_0-0-3.6.6-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libsoup-devel-3.6.6-160000.1.1.ppc64le",
                "product": {
                  "name": "libsoup-devel-3.6.6-160000.1.1.ppc64le",
                  "product_id": "libsoup-devel-3.6.6-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
                  "product_id": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libsoup-3_0-0-3.6.6-160000.1.1.s390x",
                "product": {
                  "name": "libsoup-3_0-0-3.6.6-160000.1.1.s390x",
                  "product_id": "libsoup-3_0-0-3.6.6-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libsoup-devel-3.6.6-160000.1.1.s390x",
                "product": {
                  "name": "libsoup-devel-3.6.6-160000.1.1.s390x",
                  "product_id": "libsoup-devel-3.6.6-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
                "product": {
                  "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
                  "product_id": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
                "product": {
                  "name": "libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
                  "product_id": "libsoup-3_0-0-3.6.6-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libsoup-devel-3.6.6-160000.1.1.x86_64",
                "product": {
                  "name": "libsoup-devel-3.6.6-160000.1.1.x86_64",
                  "product_id": "libsoup-devel-3.6.6-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64",
                  "product_id": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 16.0",
                "product": {
                  "name": "openSUSE Leap 16.0",
                  "product_id": "openSUSE Leap 16.0"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-3_0-0-3.6.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64"
        },
        "product_reference": "libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-3_0-0-3.6.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le"
        },
        "product_reference": "libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-3_0-0-3.6.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x"
        },
        "product_reference": "libsoup-3_0-0-3.6.6-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-3_0-0-3.6.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64"
        },
        "product_reference": "libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-devel-3.6.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64"
        },
        "product_reference": "libsoup-devel-3.6.6-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-devel-3.6.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le"
        },
        "product_reference": "libsoup-devel-3.6.6-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-devel-3.6.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x"
        },
        "product_reference": "libsoup-devel-3.6.6-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-devel-3.6.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64"
        },
        "product_reference": "libsoup-devel-3.6.6-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsoup-lang-3.6.6-160000.1.1.noarch as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch"
        },
        "product_reference": "libsoup-lang-3.6.6-160000.1.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64"
        },
        "product_reference": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x"
        },
        "product_reference": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        },
        "product_reference": "typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-12105",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-12105"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-12105",
          "url": "https://www.suse.com/security/cve/CVE-2025-12105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252555 for CVE-2025-12105",
          "url": "https://bugzilla.suse.com/1252555"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-12105"
    },
    {
      "cve": "CVE-2025-14523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-14523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in libsoup\u0027s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-14523",
          "url": "https://www.suse.com/security/cve/CVE-2025-14523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254876 for CVE-2025-14523",
          "url": "https://bugzilla.suse.com/1254876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-14523"
    },
    {
      "cve": "CVE-2025-32049",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-32049"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-32049",
          "url": "https://www.suse.com/security/cve/CVE-2025-32049"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240751 for CVE-2025-32049",
          "url": "https://bugzilla.suse.com/1240751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250562 for CVE-2025-32049",
          "url": "https://bugzilla.suse.com/1250562"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-32049"
    },
    {
      "cve": "CVE-2026-1467",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-1467"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-1467",
          "url": "https://www.suse.com/security/cve/CVE-2026-1467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257398 for CVE-2026-1467",
          "url": "https://bugzilla.suse.com/1257398"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-1467"
    },
    {
      "cve": "CVE-2026-1539",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-1539"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-1539",
          "url": "https://www.suse.com/security/cve/CVE-2026-1539"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257441 for CVE-2026-1539",
          "url": "https://bugzilla.suse.com/1257441"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-1539"
    },
    {
      "cve": "CVE-2026-1760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-1760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-1760",
          "url": "https://www.suse.com/security/cve/CVE-2026-1760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257597 for CVE-2026-1760",
          "url": "https://bugzilla.suse.com/1257597"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-1760"
    },
    {
      "cve": "CVE-2026-2369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-2369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-2369",
          "url": "https://www.suse.com/security/cve/CVE-2026-2369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258120 for CVE-2026-2369",
          "url": "https://bugzilla.suse.com/1258120"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-2369"
    },
    {
      "cve": "CVE-2026-2443",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-2443"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-2443",
          "url": "https://www.suse.com/security/cve/CVE-2026-2443"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258170 for CVE-2026-2443",
          "url": "https://bugzilla.suse.com/1258170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-2443"
    },
    {
      "cve": "CVE-2026-2708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-2708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
          "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
          "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-2708",
          "url": "https://www.suse.com/security/cve/CVE-2026-2708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258508 for CVE-2026-2708",
          "url": "https://bugzilla.suse.com/1258508"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-3_0-0-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:libsoup-devel-3.6.6-160000.1.1.x86_64",
            "openSUSE Leap 16.0:libsoup-lang-3.6.6-160000.1.1.noarch",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.aarch64",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.s390x",
            "openSUSE Leap 16.0:typelib-1_0-Soup-3_0-3.6.6-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-18T10:01:12Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-2708"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…