Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Thu, 19 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service. |
| Title | libsoup: libsoup: Buffer overread due to integer underflow when handling zero-length resources | Libsoup: libsoup: buffer overread due to integer underflow when handling zero-length resources |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
|
Thu, 12 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libsoup
Libsoup libsoup |
|
| Vendors & Products |
Libsoup
Libsoup libsoup |
Thu, 12 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | libsoup: libsoup: Buffer overread due to integer underflow when handling zero-length resources | |
| Weaknesses | CWE-191 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-19T14:42:31.418Z
Reserved: 2026-02-11T20:31:34.894Z
Link: CVE-2026-2369
Updated: 2026-03-19T14:42:26.872Z
Status : Received
Published: 2026-03-19T15:16:25.603
Modified: 2026-03-19T15:16:25.603
Link: CVE-2026-2369
OpenCVE Enrichment
Updated: 2026-02-12T11:19:48Z