Vulnerability Description
A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:1948
- https://access.redhat.com/errata/RHSA-2026:2005
- https://access.redhat.com/errata/RHSA-2026:2006
- https://access.redhat.com/errata/RHSA-2026:2007
- https://access.redhat.com/errata/RHSA-2026:2008
- https://access.redhat.com/errata/RHSA-2026:2049
- https://access.redhat.com/errata/RHSA-2026:2182
- https://access.redhat.com/errata/RHSA-2026:2214
- https://access.redhat.com/errata/RHSA-2026:2215
- https://access.redhat.com/errata/RHSA-2026:2216
- https://access.redhat.com/errata/RHSA-2026:2396
- https://access.redhat.com/errata/RHSA-2026:2402
- https://access.redhat.com/errata/RHSA-2026:2512
- https://access.redhat.com/errata/RHSA-2026:2513
- https://access.redhat.com/errata/RHSA-2026:2514
FAQ
What is CVE-2026-0719?
CVE-2026-0719 is a vulnerability with a CVSS score of 8.6 (HIGH). A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an inte...
How severe is CVE-2026-0719?
CVE-2026-0719 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0719?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.