vulnerability
Red Hat: CVE-2026-0719: libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:P/I:P/A:C) | Jan 8, 2026 | Feb 6, 2026 | Feb 9, 2026 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:C)
Published
Jan 8, 2026
Added
Feb 6, 2026
Modified
Feb 9, 2026
Description
A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
Solutions
redhat-upgrade-libsoup3redhat-upgrade-libsoup3-debuginforedhat-upgrade-libsoup3-debugsourceredhat-upgrade-libsoup3-develredhat-upgrade-libsoup3-doc
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.