Libsoup Multipart HTTP Response Buffer Overflow CVE-2026-1761
CVE-2026-1761 Published on February 2, 2026
Libsoup: stack-based buffer overflow in libsoup multipart response parsingmultipart http response
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
Vulnerability Analysis
CVE-2026-1761 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a high impact on integrity, and a small impact on availability.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2026-1761 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2026-1761
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-1761 are published in these products:
Affected Versions
Red Hat Enterprise Linux 10:- Version 0:3.6.5-3.el10_1.9 and below * is unaffected.
- Version 0:3.6.5-3.el10_1.10 and below * is unaffected.
- Version 0:3.6.5-3.el10_0.14 and below * is unaffected.
- Version 0:2.62.2-11.el7_9 and below * is unaffected.
- Version 0:8.10-7 and below * is unaffected.
- Version 0:2.62.3-13.el8_10 and below * is unaffected.
- Version 0:2.62.3-13.el8_10 and below * is unaffected.
- Version 0:2.62.3-1.el8_2.8 and below * is unaffected.
- Version 0:8.10-7.el8_2.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_4.8 and below * is unaffected.
- Version 0:8.10-7.el8_4.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_4.8 and below * is unaffected.
- Version 0:8.10-7.el8_4.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-3.el8_8.8 and below * is unaffected.
- Version 0:8.10-7.el8_8.1 and below * is unaffected.
- Version 0:2.62.3-3.el8_8.8 and below * is unaffected.
- Version 0:8.10-7.el8_8.1 and below * is unaffected.
- Version 0:2.72.0-12.el9_7.5 and below * is unaffected.
- Version 0:2.72.0-8.el9_0.9 and below * is unaffected.
- Version 0:2.72.0-8.el9_2.10 and below * is unaffected.
- Version 0:2.72.0-8.el9_4.9 and below * is unaffected.
- Version 0:2.72.0-10.el9_6.6 and below * is unaffected.
- Version sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96 and below * is unaffected.
- Version sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692 and below * is unaffected.
- Version sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.