A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, applications utilizing libsoup's WebSocket support should ensure that the `max_incoming_payload_size` is explicitly set to a non-zero value. This prevents the library from processing WebSocket frames with an unset or zero maximum payload size, which can lead to out-of-bounds reads. Consult application-specific documentation for configuring libsoup parameters.

History

Wed, 14 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Title libsoup: Out-of-Bounds Read in libsoup WebSocket Frame Processing Libsoup: out-of-bounds read in libsoup websocket frame processing
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Fri, 09 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted.
Title libsoup: Out-of-Bounds Read in libsoup WebSocket Frame Processing
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-14T14:36:02.731Z

Reserved: 2026-01-08T11:48:19.812Z

Link: CVE-2026-0716

cve-icon Vulnrichment

Updated: 2026-01-14T14:35:53.934Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-13T23:16:04.163

Modified: 2026-01-14T16:25:12.057

Link: CVE-2026-0716

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-08T00:00:00Z

Links: CVE-2026-0716 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses