{
  "threat_severity" : "Low",
  "public_date" : "2026-02-13T00:00:00Z",
  "bugzilla" : {
    "description" : "libsoup: Out-of-Bounds Read in libsoup handle_partial_get() Leading to Heap Information Disclosure",
    "id" : "2439671",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2439671"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-125",
  "details" : [ "A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.", "A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component." ],
  "statement" : "This issue has a LOW impact. An out-of-bounds read vulnerability in libsoup, when processing HTTP Range headers, can lead to heap information disclosure. Although upstream exploitation may allow disclosure of heap memory contents, Red Hat does not build GLib with G_DISABLE_CHECKS, which prevents creation of out-of-bounds byte slices in supported products. As a result, the risk of meaningful information disclosure in shipped configurations is limited. The issue primarily affects applications exposing the SoupServer component and processing untrusted HTTP Range headers.",
  "acknowledgement" : "Red Hat would like to thank Codean Labs for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Fix deferred",
    "package_name" : "libsoup3",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Fix deferred",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-2443\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-2443\nhttps://gitlab.gnome.org/GNOME/libsoup/-/issues/487" ],
  "name" : "CVE-2026-2443",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}