Source: libsoup3
Version: 3.6.5-6
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libsoup3.

CVE-2026-0719[0]:
| A flaw was found in libsoup's NTLM (NT LAN Manager) authentication
| module. When NTLM authentication is enabled, a local attacker can
| exploit a stack-based buffer overflow vulnerability in the md4sum()
| function. This allows the attacker to overwrite adjacent memory,
| which may result in arbitrary code execution with the privileges of
| the affected application.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-0719
    https://www.cve.org/CVERecord?id=CVE-2026-0719
[1] https://gitlab.gnome.org/GNOME/libsoup/-/issues/477

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to