vulnerability

Red Hat: CVE-2026-0719: libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:C)
Published
Jan 8, 2026
Added
Feb 6, 2026
Modified
Feb 9, 2026

Description

A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.

Solutions

redhat-upgrade-libsoup3redhat-upgrade-libsoup3-debuginforedhat-upgrade-libsoup3-debugsourceredhat-upgrade-libsoup3-develredhat-upgrade-libsoup3-doc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.