{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-2_4-1":"2.68.4-150200.4.33.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.68.4-150200.4.33.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n- CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398).\n- CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects\n  (bsc#1257441).\n- CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request\n  smuggling and potential DoS (bsc#1257597).\n","id":"SUSE-SU-2026:0792-1","modified":"2026-03-04T01:04:14Z","published":"2026-03-04T01:04:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260792-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1467"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1760"}],"related":["CVE-2026-1467","CVE-2026-1539","CVE-2026-1760"],"summary":"Security update for libsoup","upstream":["CVE-2026-1467","CVE-2026-1539","CVE-2026-1760"]}