2019-10-07 14:50:01 UTC
Tags: security upstream
The following vulnerability was published for libsoup2.4.
| libsoup through 2.68.1 has a heap-based buffer over-read because
| soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly
| check an NTLM message's length before proceeding with a memcpy.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
Please adjust the affected versions in the BTS as needed.