File _patchinfo of Package patchinfo.42597
<patchinfo incident="42597"> <issue tracker="cve" id="2026-1761"/> <issue tracker="bnc" id="1257598">VUL-0: CVE-2026-1761: libsoup,libsoup2: incorrect length calculation when parsing of multipart HTTP responses can lead to a stack-based buffer overflow</issue> <issue tracker="cve" id="2026-0716"/> <issue tracker="bnc" id="1256418">VUL-0: CVE-2026-0716: libsoup: improper bounds handling may allow out-of-bounds read</issue> <issue tracker="cve" id="2025-4476"/> <issue tracker="bnc" id="1243422">VUL-0: CVE-2025-4476: libsoup,libsoup2: libsoup: null pointer dereference may lead to denial of service</issue> <packager>JonathanKang</packager> <rating>important</rating> <category>security</category> <summary>Security update for libsoup2</summary> <description>This update for libsoup2 fixes the following issues: - CVE-2026-1761: Check length of bytes read in soup_filter_input_stream_read_until to avoid a stack-based buffer overflow (bsc#1257598). - CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418). - CVE-2025-4476: null pointer dereference may lead to denial of service (bsc#1243422). </description> </patchinfo>