{
  "threat_severity" : "Important",
  "public_date" : "2026-02-02T00:00:00Z",
  "bugzilla" : {
    "description" : "libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response",
    "id" : "2435961",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2435961"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-121",
  "details" : [ "A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.", "A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction." ],
  "statement" : "This IMPORTANT flaw in libsoup involves a stack-based buffer overflow during the parsing of multipart HTTP responses. A remote attacker can exploit this vulnerability by sending a specially crafted response, leading to memory corruption and potentially arbitrary code execution or application crashes in Red Hat products that utilize libsoup to process untrusted server responses. This issue does not require authentication or user interaction.",
  "acknowledgement" : "Red Hat would like to thank Naoki Wakamatsu for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2182",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "libsoup3-0:3.6.5-3.el10_1.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2410",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "libsoup3-0:3.6.5-3.el10_1.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2006",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "libsoup3-0:3.6.5-3.el10_0.14"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2026-02-12T00:00:00Z",
    "advisory" : "RHSA-2026:2628",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "libsoup-0:2.62.2-11.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2214",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "spice-client-win-0:8.10-7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2215",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "libsoup-0:2.62.3-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2215",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "libsoup-0:2.62.3-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2396",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "libsoup-0:2.62.3-1.el8_2.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2513",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "spice-client-win-0:8.10-7.el8_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2402",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "libsoup-0:2.62.3-2.el8_4.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2514",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "spice-client-win-0:8.10-7.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2402",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "libsoup-0:2.62.3-2.el8_4.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2514",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "spice-client-win-0:8.10-7.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1948",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "libsoup-0:2.62.3-3.el8_8.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2528",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "spice-client-win-0:8.10-7.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1948",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "libsoup-0:2.62.3-3.el8_8.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2528",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "spice-client-win-0:8.10-7.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2216",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libsoup-0:2.72.0-12.el9_7.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2008",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "libsoup-0:2.72.0-8.el9_0.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2005",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "libsoup-0:2.72.0-8.el9_2.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2007",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "libsoup-0:2.72.0-8.el9_4.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2049",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "libsoup-0:2.72.0-10.el9_6.6"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/openvsx-rhel9:1770851052"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/pluginregistry-rhel9:1770918006"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/udi-rhel9:1770913862"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-1761\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-1761\nhttps://gitlab.gnome.org/GNOME/libsoup/-/issues/493" ],
  "name" : "CVE-2026-1761",
  "mitigation" : {
    "value" : "To mitigate this issue, applications utilizing libsoup that process HTTP responses should be configured to only communicate with trusted endpoints. Implement network egress filtering to restrict vulnerable applications from connecting to untrusted external services, thereby reducing the exposure to specially crafted multipart HTTP responses.",
    "lang" : "en:us"
  },
  "csaw" : false
}