A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
https://access.redhat.com/errata/RHSA-2026:2844
https://access.redhat.com/errata/RHSA-2026:2628
https://access.redhat.com/errata/RHSA-2026:2529
https://access.redhat.com/errata/RHSA-2026:2528
https://access.redhat.com/errata/RHSA-2026:2514
https://access.redhat.com/errata/RHSA-2026:2513
https://access.redhat.com/errata/RHSA-2026:2512
https://access.redhat.com/errata/RHSA-2026:2402
https://access.redhat.com/errata/RHSA-2026:2396
https://access.redhat.com/errata/RHSA-2026:2216
https://access.redhat.com/errata/RHSA-2026:2215
https://access.redhat.com/errata/RHSA-2026:2214
https://access.redhat.com/errata/RHSA-2026:2182
https://access.redhat.com/errata/RHSA-2026:2049
https://access.redhat.com/errata/RHSA-2026:2008
https://access.redhat.com/errata/RHSA-2026:2007
https://access.redhat.com/errata/RHSA-2026:2006