Home

Description

A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a Use-After-Free, occurs in the HTTP/2 server implementation. A remote attacker can exploit this by sending specially crafted HTTP/2 requests that cause authentication failures. This can lead to the application attempting to access memory that has already been freed, potentially causing application instability or crashes, resulting in a Denial of Service (DoS).

PUBLISHED Reserved 2026-03-16 | Published 2026-03-17 | Updated 2026-03-25 | Assigner redhat




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

Use After Free

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-03-16:Reported to Red Hat.
2026-03-16:Made public.

Credits

Red Hat would like to thank fouzhe for reporting this issue.

References

gitlab.gnome.org/GNOME/libsoup/-/issues/496 exploit

access.redhat.com/security/cve/CVE-2026-4271 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2448044 (RHBZ#2448044) issue-tracking

gitlab.gnome.org/GNOME/libsoup/-/issues/496

cve.org (CVE-2026-4271)

nvd.nist.gov (CVE-2026-4271)

Download JSON