Impact
A flaw in libsoup’s NTLM authentication routine triggers a signed‑to‑unsigned conversion error when handling unusually long passwords. The conversion causes an internal size calculation to overflow, leading to an incorrect stack allocation and unsafe memory copying. As a consequence, applications that employ libsoup can crash, resulting in a denial‑of‑service condition.
Affected Systems
Red Hat Customer Advisory Service lists a broad set of affected operating systems, including Red Hat Enterprise Linux 6, 7 (Extended Lifecycle Support), 8, 8.2, 8.4, 8.6, 8.8, 9, 9.4, and 9.6, as well as Red Hat Enterprise Linux 10 and all of its extended update tracks. Red Hat OpenShift Dev Spaces 3.26 is also impacted. The vulnerability resides in the underlying libsoup library that is bundled with these distributions.
Risk and Exploitability
The metric set indicates a CVSS score of 8.6, yet the EPSS suggests exploitation probability is below 1 % and it is not listed in the CISA KEV catalog. The stack overflow can be triggered remotely by delivering a specially crafted NTLM authentication message to any application using libsoup, though exploitation would require the attacker to control the authentication payload. Because the flaw leads only to crashes, the most immediate risk is to service availability rather than to confidentiality or integrity.
OpenCVE Enrichment