This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2019-17266 libsoup: heap-based over-read in soup_ntlm_parse_challenge() in soup-auth-ntlm.c
Product:
[Other] Security Response
Reporter:
Dhananjay Arunesh <darunesh>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
NOTABUG
QA Contact:
Severity:
high
Docs Contact:
Priority:
high
Version:
unspecified CC:
caillon+fedoraproject, danw, erik-fedora, fidencio, gnome-sig, john.j5live, klember, marcandre.lureau, mbarnes, mclasen, mcrha, rh-spice-bugs, rhughes, rjones, rschiron, rstrode, sandmann, tpopela
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
libsoup 2.66.4, libsoup 2.68.2
Doc Type:
If docs needed, set a value
Doc Text:
Story Points:
---
Clone Of:
Environment:
Last Closed:
2019-12-10 01:24:13 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1771294 , 1771295 , 1771296
Bug Blocks:
1771293