{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.4-slfo.1.1_6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.4-slfo.1.1_6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n- CVE-2025-14523: flaw in HTTP header handling can lead to host header parsing discrepancy between servers and proxies\n  and allow for request smuggling, cache poisoning and bypass of access controls (bsc#1254876).\n- CVE-2025-12105: heap use-after-free in message queue handling during HTTP/2 read completion can lead to undefined\n  behavior or crash (bsc#1252555).\n- CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418).\n- CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399).\n","id":"SUSE-SU-2026:20360-1","modified":"2026-01-19T11:45:24Z","published":"2026-01-19T11:45:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620360-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256399"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256418"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-12105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-14523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0716"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0719"}],"related":["CVE-2025-12105","CVE-2025-14523","CVE-2026-0716","CVE-2026-0719"],"summary":"Security update for libsoup","upstream":["CVE-2025-12105","CVE-2025-14523","CVE-2026-0716","CVE-2026-0719"]}