CVE-2026-0719
📋 TL;DR
This vulnerability in libsoup's NTLM authentication handling allows attackers to cause denial-of-service crashes by sending extremely long passwords that trigger an integer overflow. Applications using libsoup for HTTP communication in GNOME and other environments are affected. The flaw results in incorrect stack memory allocation followed by unsafe copying operations.
💻 Affected Systems
- libsoup
- GNOME applications using libsoup
- Other applications using libsoup HTTP library
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete denial-of-service for applications using libsoup, potentially affecting system stability if critical services rely on these applications.
Likely Case
Application crashes and service disruption when malicious NTLM authentication attempts are made.
If Mitigated
Minimal impact with proper network controls and updated software.
🎯 Exploit Status
Exploitation requires ability to send NTLM authentication requests with extremely long passwords to vulnerable applications. No authentication bypass - requires NTLM authentication context.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Red Hat advisories for specific patched versions
Vendor Advisory: https://access.redhat.com/errata/RHSA-2026:1948
Restart Required: Yes
Instructions:
1. Check your distribution's security advisories. 2. Update libsoup package using your package manager. 3. Restart affected applications/services. 4. For Red Hat systems: 'yum update libsoup' or 'dnf update libsoup' followed by service restarts.
🔧 Temporary Workarounds
Disable NTLM Authentication
linuxConfigure applications to disable NTLM authentication if not required
# Application-specific configuration required
# Check application documentation for NTLM disable options
Network Filtering
linuxBlock NTLM authentication attempts at network perimeter
# Example iptables rule to block NTLM traffic
# iptables -A INPUT -p tcp --dport 80 -m string --string "NTLM" --algo bm -j DROP
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems
- Deploy WAF or IPS rules to detect and block malicious NTLM authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check libsoup version and compare against patched versions in Red Hat advisories
Check Version:
rpm -q libsoup || dpkg -l | grep libsoup || lsoup-version
Verify Fix Applied:
Verify libsoup package version matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Application crashes with segmentation faults
- Failed authentication attempts with unusually long credentials
- libsoup error messages related to memory allocation
Network Indicators:
- Multiple NTLM authentication attempts with long password fields
- Unusual NTLM traffic patterns
SIEM Query:
source="application.logs" AND ("segmentation fault" OR "libsoup" OR "NTLM") AND message="*password*"
🔗 References
- https://access.redhat.com/errata/RHSA-2026:1948
- https://access.redhat.com/errata/RHSA-2026:2005
- https://access.redhat.com/errata/RHSA-2026:2006
- https://access.redhat.com/errata/RHSA-2026:2007
- https://access.redhat.com/errata/RHSA-2026:2008
- https://access.redhat.com/errata/RHSA-2026:2049
- https://access.redhat.com/errata/RHSA-2026:2182
- https://access.redhat.com/errata/RHSA-2026:2214
- https://access.redhat.com/errata/RHSA-2026:2215
- https://access.redhat.com/errata/RHSA-2026:2216
- https://access.redhat.com/errata/RHSA-2026:2396
- https://access.redhat.com/errata/RHSA-2026:2402
- https://access.redhat.com/errata/RHSA-2026:2512
- https://access.redhat.com/errata/RHSA-2026:2513
- https://access.redhat.com/errata/RHSA-2026:2514
- https://access.redhat.com/errata/RHSA-2026:2528
- https://access.redhat.com/errata/RHSA-2026:2529
- https://access.redhat.com/errata/RHSA-2026:2628
- https://access.redhat.com/errata/RHSA-2026:2844
- https://access.redhat.com/security/cve/CVE-2026-0719
- https://bugzilla.redhat.com/show_bug.cgi?id=2427906
- https://gitlab.gnome.org/GNOME/libsoup/-/issues/477