CVE-2026-2369
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: low
Description
AI Translation Available
A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service.
191
Integer Underflow (Wrap or Wraparound)
DraftCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Instability
Modify Memory
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Applicable Platforms
Languages:
C, C#, C++, Java
https://access.redhat.com/security/cve/CVE-2026-2369
https://bugzilla.redhat.com/show_bug.cgi?id=2439091
https://gitlab.gnome.org/GNOME/libsoup/-/issues/498