Impact
Libsoup, a widely used HTTP client library, contains a heap buffer over‑read in the sniff_unknown() function. The bug allows an attacker to read memory beyond the bounds of a heap buffer during content‑type analysis, potentially exposing sensitive information or leading to memory corruption. The input does not mention execution of arbitrary code, but such an information leak or crash could be leveraged in further attacks or as part of a broader compromise. The weakness corresponds to CWE‑126, i.e., a buffer over‑read vulnerability that can compromise data confidentiality and system reliability.
Affected Systems
The flaw affects all Red Hat Enterprise Linux releases from 6 through 10, including the 8.8 Extended Update Support (EUS), 9.2 EUS, and 9.4 EUS branches. Systems running any of these platforms that incorporate an unpatched version of the libsoup library are affected.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. An EPSS score of 1% shows a low but non‑zero probability that the vulnerability will be exploited in the wild. The flaw is not listed in CISA’s KEV catalog, so there is no evidence of active exploitation. The likely attack vector involves an adversary sending crafted network traffic—such as a malicious HTTP request—to a service that incorporates libsoup. Since the buffer over‑read occurs during the sniffing of unknown content types, any HTTP client or server that uses libsoup as its transport layer could be a target. The exploit landscape is limited to systems with old or unpatched libsoup installations, and remediation through RHEL errata is available.
OpenCVE Enrichment
Debian DLA
EUVD
Ubuntu USN