Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2443: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2026-2443cvecve-2026-2443
Published: Fri Feb 13 2026 (02/13/2026, 11:58:20 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:20:17 UTC

Technical Analysis

CVE-2026-2443 is an out-of-bounds read vulnerability identified in libsoup, a widely used HTTP client and server library in GNOME-based environments. The issue arises from improper validation of HTTP Range headers, which specify byte ranges for partial content retrieval. When libsoup processes specially crafted Range headers in certain build configurations, it may read memory beyond the intended buffer boundaries. This flaw specifically affects the SoupServer component embedded in applications or services that use libsoup as an HTTP server. An attacker with network access to a vulnerable server can send malicious HTTP requests with crafted Range headers to trigger out-of-bounds reads, potentially exposing sensitive server memory contents. The vulnerability does not allow code execution or denial of service but can leak confidential information from server memory. Exploitation does not require authentication or user interaction, increasing its risk profile. However, the vulnerability depends on specific build configurations and the presence of the SoupServer component, limiting its attack surface. Red Hat Enterprise Linux 10 includes libsoup and is confirmed affected. No public exploits or widespread attacks have been reported to date. The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, no user interaction, and limited confidentiality impact. This vulnerability highlights the importance of careful input validation in HTTP header parsing within server libraries.

Potential Impact

The primary impact of CVE-2026-2443 is the potential unauthorized disclosure of sensitive information from server memory due to out-of-bounds reads. Organizations running vulnerable versions of Red Hat Enterprise Linux 10 with libsoup's SoupServer enabled may risk leakage of confidential data, which could include sensitive application data, credentials, or cryptographic material residing in memory buffers. While the vulnerability does not enable remote code execution or denial of service, the confidentiality breach can facilitate further attacks such as privilege escalation or lateral movement if attackers obtain critical information. The ease of exploitation (no authentication or user interaction required) combined with network accessibility increases the threat level, especially for internet-facing services. However, the requirement for specific build configurations and the embedded SoupServer component limits the scope to certain deployments. Enterprises relying on GNOME-based applications or custom services using libsoup as an HTTP server are particularly at risk. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the need for proactive mitigation. Failure to address this vulnerability could lead to data breaches, regulatory non-compliance, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-2443, organizations should first identify all systems running Red Hat Enterprise Linux 10 with libsoup and determine if the embedded SoupServer component is enabled and exposed to network access. Applying vendor-supplied patches or updates for libsoup as soon as they become available is critical. In the absence of patches, disabling or restricting access to services using SoupServer can reduce exposure. Network-level controls such as firewall rules should limit inbound HTTP traffic to trusted sources. Additionally, monitoring HTTP request headers for anomalous or suspicious Range header values can help detect exploitation attempts. Developers and system administrators should review build configurations to avoid enabling vulnerable SoupServer features unnecessarily. Employing memory protection mechanisms and runtime application self-protection (RASP) can provide additional defense layers. Regular security assessments and penetration testing focusing on HTTP header parsing can identify residual risks. Finally, maintaining an inventory of applications using libsoup and ensuring they are updated or replaced if unmaintained will reduce long-term exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-13T04:32:46.051Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698f214cc9e1ff5ad82dd77b

Added to database: 2/13/2026, 1:04:12 PM

Last enriched: 3/24/2026, 12:20:17 AM

Last updated: 3/30/2026, 9:12:34 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses