Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0134

NIXPKGS-2026-0134
published on 6 Feb 2026
updated 2 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: libsoup: arbitrary code execution via stack-based buffer overflow in ntlm authentication

A flaw was found in libsoup's NTLM (NT LAN Manager) authentication module. When NTLM authentication is enabled, a local attacker can exploit a stack-based buffer overflow vulnerability in the md4sum() function. This allows the attacker to overwrite adjacent memory, which may result in arbitrary code execution with the privileges of the affected application.

Affected products

libsoup
  • *
libsoup3
  • *
spice-client-win
  • *
devspaces/udi-rhel9
  • *
devspaces/openvsx-rhel9
  • *
devspaces/pluginregistry-rhel9
  • *

Matching in nixpkgs

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/libsoup/-/issues/477