Bug 2427908 - CVE-2026-0719 libsoup3: libsoup: Arbitrary code execution via stack-based buffer overflow in NTLM authentication [fedora-42]
Summary: CVE-2026-0719 libsoup3: libsoup: Arbitrary code execution via stack-based buf...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: libsoup3
Version: 42
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Gwyn Ciesla
QA Contact:
URL:
Whiteboard: {"flaws": ["c7cb56b2-6084-4648-a411-a...
Depends On:
Blocks: CVE-2026-0719
TreeView+ depends on / blocked
 
Reported: 2026-01-08 12:17 UTC by Abhishek Raj
Modified: 2026-03-19 14:35 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-03-19 14:35:11 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
GNOME Gitlab GNOME libsoup issues 477 0 None opened (CVE-2026-0719) (#YWH-PGM9867-125) Signed to Unsigned Conversion Error on libsoup through libsoup/auth/soup-auth-ntlm.c ... 2026-03-19 14:33:39 UTC

Description Abhishek Raj 2026-01-08 12:17:16 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Milan Crha 2026-03-19 14:35:11 UTC
There is no upstream fix and I'd defer any backport to the f42 anyway, due to it reach its end of life soon.


Note You need to log in before you can comment on or make changes to this bug.