Описание
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
Отчет
This IMPORTANT flaw in libsoup involves a stack-based buffer overflow during the parsing of multipart HTTP responses. A remote attacker can exploit this vulnerability by sending a specially crafted response, leading to memory corruption and potentially arbitrary code execution or application crashes in Red Hat products that utilize libsoup to process untrusted server responses. This issue does not require authentication or user interaction.
Меры по смягчению последствий
To mitigate this issue, applications utilizing libsoup that process HTTP responses should be configured to only communicate with trusted endpoints. Implement network egress filtering to restrict vulnerable applications from connecting to untrusted external services, thereby reducing the exposure to specially crafted multipart HTTP responses.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | libsoup | Out of support scope | ||
| Red Hat Enterprise Linux 10 | libsoup3 | Fixed | RHSA-2026:2182 | 05.02.2026 |
| Red Hat Enterprise Linux 10 | libsoup3 | Fixed | RHSA-2026:2410 | 10.02.2026 |
| Red Hat Enterprise Linux 10.0 Extended Update Support | libsoup3 | Fixed | RHSA-2026:2006 | 05.02.2026 |
| Red Hat Enterprise Linux 7 Extended Lifecycle Support | libsoup | Fixed | RHSA-2026:2628 | 12.02.2026 |
| Red Hat Enterprise Linux 8 | spice-client-win | Fixed | RHSA-2026:2214 | 09.02.2026 |
| Red Hat Enterprise Linux 8 | libsoup | Fixed | RHSA-2026:2215 | 09.02.2026 |
| Red Hat Enterprise Linux 8 | libsoup | Fixed | RHSA-2026:2215 | 09.02.2026 |
| Red Hat Enterprise Linux 8.2 Advanced Update Support | libsoup | Fixed | RHSA-2026:2396 | 10.02.2026 |
| Red Hat Enterprise Linux 8.2 Advanced Update Support | spice-client-win | Fixed | RHSA-2026:2513 | 11.02.2026 |
Показывать по
Дополнительная информация
Статус:
8.6 High
CVSS3
Связанные уязвимости
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
A flaw was found in libsoup. This stack-based buffer overflow vulnerab ...
8.6 High
CVSS3