SUSE SLES12 Security Update : libsoup (SUSE-SU-2025:1518-1)

high Nessus Plugin ID 235647

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:1518-1 advisory.

- CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
- CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
- CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)
- CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing content (bsc#1240750)
- CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752)
- CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756)
- CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757)
- CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222)
- CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164)
- CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686)
- CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1233285

https://bugzilla.suse.com/1233287

https://bugzilla.suse.com/1233292

https://bugzilla.suse.com/1240750

https://bugzilla.suse.com/1240752

https://bugzilla.suse.com/1240756

https://bugzilla.suse.com/1240757

https://bugzilla.suse.com/1241164

https://bugzilla.suse.com/1241222

https://bugzilla.suse.com/1241686

https://bugzilla.suse.com/1241688

https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html

https://www.suse.com/security/cve/CVE-2024-52530

https://www.suse.com/security/cve/CVE-2024-52531

https://www.suse.com/security/cve/CVE-2024-52532

https://www.suse.com/security/cve/CVE-2025-2784

https://www.suse.com/security/cve/CVE-2025-32050

https://www.suse.com/security/cve/CVE-2025-32052

https://www.suse.com/security/cve/CVE-2025-32053

https://www.suse.com/security/cve/CVE-2025-32907

https://www.suse.com/security/cve/CVE-2025-32914

https://www.suse.com/security/cve/CVE-2025-46420

https://www.suse.com/security/cve/CVE-2025-46421

Plugin Details

Severity: High

ID: 235647

File Name: suse_SU-2025-1518-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 5/9/2025

Updated: 5/9/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:N/A:C

CVSS Score Source: CVE-2025-32914

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:typelib-1_0-soup-2_4, p-cpe:/a:novell:suse_linux:libsoup-devel, p-cpe:/a:novell:suse_linux:libsoup-2_4-1-32bit, p-cpe:/a:novell:suse_linux:libsoup-lang, p-cpe:/a:novell:suse_linux:libsoup-2_4-1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/8/2025

Vulnerability Publication Date: 11/11/2024

Reference Information

CVE: CVE-2024-52530, CVE-2024-52531, CVE-2024-52532, CVE-2025-2784, CVE-2025-32050, CVE-2025-32052, CVE-2025-32053, CVE-2025-32907, CVE-2025-32914, CVE-2025-46420, CVE-2025-46421

SuSE: SUSE-SU-2025:1518-1