CVE-2026-0719 vulnerability in Red Hat Products
Published on January 8, 2026
Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication
A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
Vulnerability Analysis
CVE-2026-0719 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and a high impact on availability.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2026-0719 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2026-0719
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-0719 are published in these products:
Affected Versions
Red Hat Enterprise Linux 10:- Version 0:3.6.5-3.el10_1.9 and below * is unaffected.
- Version 0:3.6.5-3.el10_0.14 and below * is unaffected.
- Version 0:2.62.2-11.el7_9 and below * is unaffected.
- Version 0:8.10-7 and below * is unaffected.
- Version 0:2.62.3-13.el8_10 and below * is unaffected.
- Version 0:2.62.3-13.el8_10 and below * is unaffected.
- Version 0:2.62.3-1.el8_2.8 and below * is unaffected.
- Version 0:8.10-7.el8_2.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_4.8 and below * is unaffected.
- Version 0:8.10-7.el8_4.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_4.8 and below * is unaffected.
- Version 0:8.10-7.el8_4.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-2.el8_6.8 and below * is unaffected.
- Version 0:8.10-7.el8_6.1 and below * is unaffected.
- Version 0:2.62.3-3.el8_8.8 and below * is unaffected.
- Version 0:8.10-7.el8_8.1 and below * is unaffected.
- Version 0:2.62.3-3.el8_8.8 and below * is unaffected.
- Version 0:8.10-7.el8_8.1 and below * is unaffected.
- Version 0:2.72.0-12.el9_7.5 and below * is unaffected.
- Version 0:2.72.0-8.el9_0.9 and below * is unaffected.
- Version 0:2.72.0-8.el9_2.10 and below * is unaffected.
- Version 0:2.72.0-8.el9_4.9 and below * is unaffected.
- Version 0:2.72.0-10.el9_6.6 and below * is unaffected.
- Version sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96 and below * is unaffected.
- Version sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692 and below * is unaffected.
- Version sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.