CVE-2026-2436
Published: 26 March 2026
Description
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Security Summary
CVE-2026-2436 is a use-after-free vulnerability in libsoup's SoupServer component. The flaw arises in the soup_server_disconnect() function, which prematurely frees connection objects even when a TLS handshake is still pending. If the handshake completes after the object has been freed, a dangling pointer is accessed, causing a server crash.
A remote attacker with network access can exploit this vulnerability without privileges or user interaction, though it requires high attack complexity. Exploitation triggers a denial of service through server crash, with low integrity impact but high availability impact and no confidentiality impact. The CVSS v3.1 base score is 6.5 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H), mapped to CWE-825 (Expired Pointer Dereference).
Advisories and patches are detailed in Red Hat's security bulletin at https://access.redhat.com/security/cve/CVE-2026-2436, Red Hat Bugzilla entry https://bugzilla.redhat.com/show_bug.cgi?id=2442909, and the GNOME libsoup issue tracker at https://gitlab.gnome.org/GNOME/libsoup/-/issues/501. Security practitioners should review these resources for mitigation guidance and available updates.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Use-after-free in libsoup SoupServer enables remote exploitation to crash the server without privileges or interaction, directly facilitating endpoint DoS via application exploitation.