Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-0719

Опубликовано: 08 янв. 2026
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.

Отчет

The Red Hat Product Security team has assessed this vulnerability as Important severity due to its remote exploitability and lack of authentication requirements. Successful exploitation allows an attacker to crash any client or service using libsoup’s NTLM authentication mechanism. The root cause is improper handling of signed integer arithmetic, which leads to stack buffer overflow and denial-of-service.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libsoupOut of support scope
Red Hat Enterprise Linux 10libsoup3FixedRHSA-2026:218205.02.2026
Red Hat Enterprise Linux 10.0 Extended Update Supportlibsoup3FixedRHSA-2026:200605.02.2026
Red Hat Enterprise Linux 7 Extended Lifecycle SupportlibsoupFixedRHSA-2026:262812.02.2026
Red Hat Enterprise Linux 8spice-client-winFixedRHSA-2026:221409.02.2026
Red Hat Enterprise Linux 8libsoupFixedRHSA-2026:221509.02.2026
Red Hat Enterprise Linux 8libsoupFixedRHSA-2026:221509.02.2026
Red Hat Enterprise Linux 8.2 Advanced Update SupportlibsoupFixedRHSA-2026:239610.02.2026
Red Hat Enterprise Linux 8.2 Advanced Update Supportspice-client-winFixedRHSA-2026:251311.02.2026
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportlibsoupFixedRHSA-2026:240210.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2427906libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication

EPSS

Процентиль: 16%
0.00051
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
3 месяца назад

A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.

CVSS3: 8.6
nvd
3 месяца назад

A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.

msrc
2 месяца назад

Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication

CVSS3: 8.6
debian
3 месяца назад

A flaw was identified in the NTLM authentication handling of the libso ...

suse-cvrf
2 месяца назад

Security update for libsoup

EPSS

Процентиль: 16%
0.00051
Низкий

8.6 High

CVSS3