{"affected":[{"ecosystem_specific":{"binaries":[{"libsoup-3_0-0":"3.4.4-slfo.1.1_4.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"libsoup","purl":"pkg:rpm/suse/libsoup&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.4.4-slfo.1.1_4.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libsoup fixes the following issues:\n\n- CVE-2025-4945: Fixed Integer Overflow in Cookie Expiration Date Handling (bsc#1243314)\n- CVE-2025-4948: Fixed Integer Underflow in soup_multipart_new_from_message()\n  Leading to Denial of Service (bsc#1243332)\n- CVE-2025-4476: Fixed null pointer dereference leading to denial of service (bsc#1243422)\n- CVE-2025-4969: Fixed off-by-one out-of-bounds read leading to infoleak (bsc#1243423)\n","id":"SUSE-SU-2025:20598-1","modified":"2025-08-21T09:33:10Z","published":"2025-08-21T09:33:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520598-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243423"},{"type":"REPORT","url":"https://bugzilla.suse.com/528882"},{"type":"REPORT","url":"https://bugzilla.suse.com/553466"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4969"}],"related":["CVE-2025-4476","CVE-2025-4945","CVE-2025-4948","CVE-2025-4969"],"summary":"Security update for libsoup","upstream":["CVE-2025-4476","CVE-2025-4945","CVE-2025-4948","CVE-2025-4969"]}