<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for libsoup is now available for openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1485</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-05-09</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-05-09</InitialReleaseDate>
		<CurrentReleaseDate>2025-05-09</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-05-09</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libsoup security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libsoup is now available for openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop, to integrate well with GNOME applications, and also has a synchronous API, for use in threaded applications.

Security Fix(es):

A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory.(CVE-2025-32907)

A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.(CVE-2025-32914)

A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.(CVE-2025-46420)

A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.(CVE-2025-46421)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libsoup is now available for openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libsoup</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1485</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-32907</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-32914</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-46420</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-46421</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-32907</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-32914</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-46420</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-46421</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="libsoup-help-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-help-2.74.3-9.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="libsoup-help-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-help-2.74.3-9.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="libsoup-help-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-help-2.71.0-8.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="libsoup-help-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-help-2.74.2-9.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="libsoup-help-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-help-2.74.2-9.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-2.74.3-9.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-debuginfo-2.74.3-9.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-debugsource-2.74.3-9.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-devel-2.74.3-9.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-2.74.3-9.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-debuginfo-2.74.3-9.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-debugsource-2.74.3-9.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-devel-2.74.3-9.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-2.71.0-8.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-debuginfo-2.71.0-8.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-debugsource-2.71.0-8.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-devel-2.71.0-8.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-2.74.2-9.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-debuginfo-2.74.2-9.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-debugsource-2.74.2-9.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-devel-2.74.2-9.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-2.74.2-9.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-debuginfo-2.74.2-9.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-debugsource-2.74.2-9.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-devel-2.74.2-9.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-2.74.3-9.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-2.74.3-9.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-2.71.0-8.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-2.74.2-9.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-2.74.2-9.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-2.74.3-9.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-debuginfo-2.74.3-9.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-debugsource-2.74.3-9.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libsoup-devel-2.74.3-9.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-2.74.3-9.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-debuginfo-2.74.3-9.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-debugsource-2.74.3-9.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.3-9" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libsoup-devel-2.74.3-9.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-2.71.0-8.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-debuginfo-2.71.0-8.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-debugsource-2.71.0-8.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.71.0-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libsoup-devel-2.71.0-8.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-2.74.2-9.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-debuginfo-2.74.2-9.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-debugsource-2.74.2-9.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsoup-devel-2.74.2-9.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-2.74.2-9.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debuginfo-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-debuginfo-2.74.2-9.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-debugsource-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-debugsource-2.74.2-9.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libsoup-devel-2.74.2-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libsoup-devel-2.74.2-9.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory.</Note>
		</Notes>
		<ReleaseDate>2025-05-09</ReleaseDate>
		<CVE>CVE-2025-32907</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libsoup security update</Description>
				<DATE>2025-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1485</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.</Note>
		</Notes>
		<ReleaseDate>2025-05-09</ReleaseDate>
		<CVE>CVE-2025-32914</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.4</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libsoup security update</Description>
				<DATE>2025-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1485</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.</Note>
		</Notes>
		<ReleaseDate>2025-05-09</ReleaseDate>
		<CVE>CVE-2025-46420</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libsoup security update</Description>
				<DATE>2025-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1485</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.</Note>
		</Notes>
		<ReleaseDate>2025-05-09</ReleaseDate>
		<CVE>CVE-2025-46421</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.8</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libsoup security update</Description>
				<DATE>2025-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1485</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>