Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-2443

Опубликовано: 13 фев. 2026
Источник: redhat
CVSS3: 5.3

Описание

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

Отчет

This issue has a LOW impact. An out-of-bounds read vulnerability in libsoup, when processing HTTP Range headers, can lead to heap information disclosure. Although upstream exploitation may allow disclosure of heap memory contents, Red Hat does not build GLib with G_DISABLE_CHECKS, which prevents creation of out-of-bounds byte slices in supported products. As a result, the risk of meaningful information disclosure in shipped configurations is limited. The issue primarily affects applications exposing the SoupServer component and processing untrusted HTTP Range headers.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsoup3Fix deferred
Red Hat Enterprise Linux 6libsoupFix deferred
Red Hat Enterprise Linux 7libsoupFix deferred
Red Hat Enterprise Linux 8libsoupFix deferred
Red Hat Enterprise Linux 9libsoupFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2439671libsoup: Out-of-Bounds Read in libsoup handle_partial_get() Leading to Heap Information Disclosure

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

CVSS3: 5.3
nvd
около 1 месяца назад

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

CVSS3: 5.3
msrc
около 1 месяца назад

Libsoup: out-of-bounds read in libsoup handle_partial_get() leading to heap information disclosure

CVSS3: 5.3
debian
около 1 месяца назад

A flaw was identified in libsoup, a widely used HTTP library in GNOME- ...

CVSS3: 5.3
github
около 1 месяца назад

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

5.3 Medium

CVSS3