Home

Description

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

PUBLISHED Reserved 2026-02-13 | Published 2026-02-13 | Updated 2026-02-13 | Assigner redhat




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

Out-of-bounds Read

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-02-13:Reported to Red Hat.
2026-02-13:Made public.

Credits

Red Hat would like to thank Codean Labs for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-2443 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2439671 (RHBZ#2439671) issue-tracking

cve.org (CVE-2026-2443)

nvd.nist.gov (CVE-2026-2443)

Download JSON