Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2443: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2026-2443cvecve-2026-2443
Published: Fri Feb 13 2026 (02/13/2026, 11:58:20 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-2443 is a medium-severity vulnerability in libsoup, an HTTP library used in GNOME-based systems, including Red Hat Enterprise Linux 10. The flaw involves improper validation of HTTP Range headers, allowing an out-of-bounds read of server memory when using the embedded SoupServer component. Exploitation requires a vulnerable configuration and remote access to the server, with no authentication or user interaction needed. The vulnerability impacts confidentiality by potentially exposing sensitive memory contents but does not affect integrity or availability. No known exploits are currently in the wild. European organizations running Red Hat Enterprise Linux 10 with affected libsoup configurations are at risk, especially those exposing SoupServer-based services. Mitigation involves applying patches when available, disabling or restricting SoupServer usage, and carefully validating HTTP Range header handling in custom configurations. Countries with significant Red Hat Enterprise Linux deployments and critical infrastructure relying on GNOME-based systems are most likely affected. The CVSS score of 5. 3 reflects a medium severity due to ease of remote exploitation without authentication but limited impact scope.

AI-Powered Analysis

AILast updated: 02/13/2026, 13:18:33 UTC

Technical Analysis

CVE-2026-2443 is an out-of-bounds read vulnerability identified in libsoup, a widely used HTTP client/server library in GNOME-based environments, including Red Hat Enterprise Linux 10. The issue arises from improper validation of HTTP Range headers, which specify byte ranges for partial content retrieval. In certain build configurations where the embedded SoupServer component is used, specially crafted Range headers can cause the server to read memory beyond the intended response buffer boundaries. This out-of-bounds read can lead to disclosure of sensitive server memory contents to a remote attacker. The vulnerability requires no authentication or user interaction, and exploitation is possible remotely over the network. However, exploitation depends on the server running a vulnerable version of libsoup with SoupServer enabled and accessible. The flaw impacts confidentiality by potentially leaking memory data but does not allow modification of data or denial of service. No known exploits have been reported in the wild as of the publication date. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality only. This vulnerability is relevant to organizations using Red Hat Enterprise Linux 10 with GNOME-based services that rely on libsoup’s HTTP server capabilities, particularly those exposing HTTP services to untrusted networks.

Potential Impact

For European organizations, the primary impact of CVE-2026-2443 is the potential unauthorized disclosure of sensitive information residing in server memory. This could include confidential data processed by the HTTP server or other memory-resident secrets, depending on the server’s workload. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach could facilitate further attacks such as credential theft or information leakage. Organizations in sectors like finance, government, healthcare, and critical infrastructure that use Red Hat Enterprise Linux 10 with GNOME-based HTTP services are at higher risk. The remote and unauthenticated nature of the exploit increases exposure, especially for publicly accessible services. However, the requirement for specific build configurations and the absence of known exploits reduce immediate widespread risk. Still, targeted attacks against high-value European targets leveraging this vulnerability could compromise sensitive data confidentiality.

Mitigation Recommendations

1. Monitor Red Hat advisories and apply official patches for libsoup and Red Hat Enterprise Linux 10 promptly once available. 2. Audit server configurations to identify and disable the embedded SoupServer component if not required. 3. Restrict network access to services using libsoup’s HTTP server functionality, limiting exposure to trusted networks or VPNs. 4. Implement strict input validation and filtering on HTTP Range headers at the application or network perimeter to prevent malformed requests. 5. Employ runtime memory protection mechanisms and address space layout randomization (ASLR) to reduce the risk of successful exploitation. 6. Conduct regular security assessments and penetration testing focusing on HTTP services to detect potential misuse of Range headers. 7. Maintain comprehensive logging and monitoring to detect anomalous HTTP requests that could indicate exploitation attempts. 8. Educate system administrators about the specific risk and encourage timely updates and configuration reviews.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-13T04:32:46.051Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698f214cc9e1ff5ad82dd77b

Added to database: 2/13/2026, 1:04:12 PM

Last enriched: 2/13/2026, 1:18:33 PM

Last updated: 2/13/2026, 6:07:02 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats