CVE-2026-2443
Awaiting Analysis Awaiting Analysis - Queue
Improper Range Validation in libsoup Allows Remote Memory Access

Publication date: 2026-02-13

Last updated on: 2026-03-23

Assigner: Red Hat, Inc.

Description
A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-13
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-02-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
gnome libsoup *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2443 is an out-of-bounds read vulnerability in the libsoup library, which is used in GNOME-based systems to handle HTTP communications. The flaw occurs in the handle_partial_get() function that processes HTTP Range headers. Specifically, the end value of the byte range requested by an HTTP client is not properly validated against the total size of the HTTP response.

When libsoup is built with the G_DISABLE_CHECKS flag enabled, this improper validation allows the creation of a byte slice that exceeds the original buffer bounds. As a result, a specially crafted HTTP request with a large range value can cause the server to return memory contents beyond the intended response body.

This vulnerability can be exploited remotely without authentication or user interaction, potentially exposing sensitive heap memory data from the server.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can lead to the unintended disclosure of sensitive information stored in the server's heap memory. An attacker can remotely send a specially crafted HTTP Range request to a vulnerable server using libsoup's SoupServer component and retrieve memory contents beyond the intended HTTP response."}, {'type': 'paragraph', 'content': 'Although the severity is classified as low, the exposure of heap memory could include sensitive data, which may compromise confidentiality. The attack requires no authentication or user interaction, increasing the risk of exploitation.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'Detection of this vulnerability involves identifying if your system is running a vulnerable version of the libsoup library, particularly if it is compiled with the G_DISABLE_CHECKS flag enabled. Since the vulnerability is triggered by specially crafted HTTP Range headers, monitoring HTTP traffic for unusual or excessively large Range header values could help detect exploitation attempts.'}, {'type': 'paragraph', 'content': 'You can check the version of libsoup installed on your system using package management commands, for example:'}, {'type': 'list_item', 'content': 'On Debian/Ubuntu: dpkg -l | grep libsoup'}, {'type': 'list_item', 'content': 'On Red Hat/CentOS/Fedora: rpm -qa | grep libsoup'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on network traffic, you might use tools like tcpdump or Wireshark to filter HTTP requests with suspicious Range headers, for example:'}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'Range:'"}, {'type': 'paragraph', 'content': 'However, no specific detection commands or signatures are provided in the available resources.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the libsoup library to a version where this vulnerability is fixed. Since the flaw is related to improper validation of HTTP Range headers when GLib is compiled with G_DISABLE_CHECKS enabled, ensuring that your libsoup and GLib packages are up to date and built without this flag can prevent exploitation.

If an update is not immediately available, consider disabling or restricting the use of the embedded SoupServer component that processes HTTP requests with Range headers, or implement network-level filtering to block suspicious HTTP Range header requests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart