Impact
A flaw in the SoupServer component of libsoup introduces a use‑after‑free condition. When the server initiates a TLS handshake, the library’s disconnect routine may free the connection object before the handshake has completed. If the handshake finishes after the object has been released, the server dereferences a dangling pointer and crashes. The resulting denial of service can be triggered by a remote actor initiating a TLS connection to the affected SoupServer.
Affected Systems
The vulnerability affects Red Hat Enterprise Linux releases 10, 6, 7, 8, and 9, where the included libsoup package contains the vulnerable SoupServer. All users running the default distribution packages before the security update are potentially exposed.
Risk and Exploitability
With a CVSS score of 6.5, the flaw carries a moderate severity level. The EPSS metric is less than 1 %, indicating a very low probability of widespread exploitation at this time, and the vulnerability is currently not listed in the CISA KEV catalog. Attackers would need network access to the vulnerable SoupServer during the TLS handshake, which can be achieved through standard inbound connections, suggesting that the attack vector is network‑based.
OpenCVE Enrichment