Impact
An out-of-bounds read occurs in libsoup’s WebSocket frame processing when the maximum incoming payload size is left unset. The flaw allows the library to read memory beyond the intended bounds, which can expose sensitive data or cause a crash. This weakness is classified as CWE‑805 and threatens confidentiality and availability.
Affected Systems
Red Hat Enterprise Linux 6, 7, 8, 9, and 10 are affected due to the inclusion of the libsoup library. All installations that deploy application code using libsoup’s WebSocket functionality with the default configuration are potentially impacted because the maximum incoming payload size defaults to zero when not explicitly set.
Risk and Exploitability
The vulnerability has a CVSS score of 4.8, indicating moderate severity, and an EPSS score of less than 1 percent, reflecting a very low probability of exploitation. It has not been added to CISA’s KEV catalog, and no public exploit is known. The most likely attack vector involves an attacker sending specially crafted WebSocket frames to a target application that uses libsoup without configuring a non‑zero maximum payload size. If successful, the attacker could read arbitrary memory or trigger a denial‑of‑service condition. Although the risk remains moderate, the low exploitation probability warrants proactive mitigation.
OpenCVE Enrichment