Home

Description

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

PUBLISHED Reserved 2026-02-02 | Published 2026-02-02 | Updated 2026-02-05 | Assigner redhat




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Problem types

Stack-based Buffer Overflow

Product status

Default status
affected

0:2.62.3-3.el8_8.8 (rpm) before *
unaffected

Default status
affected

0:2.62.3-3.el8_8.8 (rpm) before *
unaffected

Default status
affected

0:2.72.0-8.el9_2.10 (rpm) before *
unaffected

Default status
affected

0:2.72.0-8.el9_4.9 (rpm) before *
unaffected

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-02-02:Reported to Red Hat.
2026-02-02:Made public.

Credits

Red Hat would like to thank Naoki Wakamatsu for reporting this issue.

References

access.redhat.com/errata/RHSA-2026:1948 (RHSA-2026:1948) vendor-advisory

access.redhat.com/errata/RHSA-2026:2005 (RHSA-2026:2005) vendor-advisory

access.redhat.com/errata/RHSA-2026:2007 (RHSA-2026:2007) vendor-advisory

access.redhat.com/security/cve/CVE-2026-1761 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2435961 (RHBZ#2435961) issue-tracking

cve.org (CVE-2026-1761)

nvd.nist.gov (CVE-2026-1761)

Download JSON